US8909926B2 - System and methodology providing automation security analysis, validation, and learning in an industrial controller environment - Google Patents
System and methodology providing automation security analysis, validation, and learning in an industrial controller environment Download PDFInfo
- Publication number
- US8909926B2 US8909926B2 US10/661,696 US66169603A US8909926B2 US 8909926 B2 US8909926 B2 US 8909926B2 US 66169603 A US66169603 A US 66169603A US 8909926 B2 US8909926 B2 US 8909926B2
- Authority
- US
- United States
- Prior art keywords
- security
- network
- data
- component
- industrial controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- the present invention relates generally to industrial control systems, and more particularly to a system and methodology to facilitate electronic and network security in an industrial automation system.
- Industrial controllers are special-purpose computers utilized for controlling industrial processes, manufacturing equipment, and other factory automation, such as data collection or networked systems.
- the industrial controller having an associated processor (or processors), measures one or more process variables or inputs reflecting the status of a controlled system, and changes outputs effecting control of such system.
- the inputs and outputs may be binary, (e.g., on or off), as well as analog inputs and outputs assuming a continuous range of values.
- I/O input/output
- I/O modules serve as an electrical interface to the controller and may be located proximate or remote from the controller including remote network interfaces to associated systems.
- Inputs and outputs may be recorded in an I/O table in processor memory, wherein input values may be asynchronously read from one or more input modules and output values written to the I/O table for subsequent communication to the control system by specialized communications circuitry (e.g., back plane interface, communications module).
- Output modules may interface directly with one or more control elements, by receiving an output from the I/O table to control a device such as a motor, valve, solenoid, amplifier, and the like.
- a logic processor such as a Programmable Logic Controller (PLC) or PC-based controller.
- PLC Programmable Logic Controller
- Programmable Logic Controllers are programmed by systems designers to operate manufacturing processes via user-designed logic programs or user programs.
- the user programs are stored in memory and generally executed by the PLC in a sequential manner although instruction jumping, looping and interrupt routines, for example, are also common.
- Associated with the user program are a plurality of memory elements or variables that provide dynamics to PLC operations and programs. These variables can be user-defined and can be defined as bits, bytes, words, integers, floating point numbers, timers, counters and/or other data types to name but a few examples.
- One attempt at providing security in industrial control systems relates to simple password protection to limit access to the systems. This can take the form of a plant or controls Engineer or Administrator entering an alpha-numeric string that is typed by an operator each time access is attempted, wherein the controller grants access based on a successful typing of the password.
- These type passwords are highly prone to attack or discovery, however.
- users employ passwords that are relatively easy to determine (e.g., person's name or birthday).
- users exchange passwords with other users, whereby the password is overheard or simply, a user with improper authorization comes in contact with the password.
- parties employing sophisticated hacking techniques can often penetrate sensitive control systems, whereby access should be limited to authorized users and/or systems in order to mitigate potentially harmful consequences.
- a Security Analysis Methodology (SAM) and tool provides an automated process, component, and tool that generates a set (or subset) of security guidelines, security data, and/or security components.
- An input to the tool can be in the form of an abstract description or model of a factory, wherein the factory description includes one or more assets to be protected and associated pathways to access the assets.
- Security data generated by the tool includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example.
- SAM can be modeled on a risk-based/cost-based approach, if desired.
- a suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost.
- descriptions of shop floor access, Intranet access, Internet access, and/or wireless access can also be processed by the tool. Since multiparty involvement can be accommodated (IT, Manufacturing, Engineering, etc.), the tool can be adapted for partitioned security specification entry and sign-off.
- the security data of the SAM tool can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired.
- a security Validation Methodology and associated tools can be provided.
- the validation tools perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified.
- One aspect of the tools is to check a system prior to security modifications in order to assess current security levels.
- Another aspect is to check a system for conformance—either to recommendations of a security analysis, and/or against standards such as ISO, for example.
- the validation tools can be executed on end devices (host based), and/or executed as an independent device that is operatively coupled to a network (network based) at selected points.
- One function of host-validation tools is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
- One function of the network validation tools is to perform vulnerability scanning and auditing on the networks. This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services. The tools can also attempt to gain key identity information about end devices that may enable hacker entry. Another function of the network validation tools is to perform vulnerability scanning and auditing on firewalls, routers, and/or other network/security devices.
- a complementary tool can be provided to assess CIP-based factory automation systems for security. This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices.
- the tool can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
- the validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters/rules/policies, install new security components, remove suspicious components, and so forth).
- a Security Learning system can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to the Validation tools.
- a network-based security learning system (also referred to as learning component) is provided that monitors an automation network during a predetermined training period (e.g., monitor network activities for 1 week).
- the learning component monitors and learns activities or patterns such as: the number of network requests to and from one or more assets; the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests); status or counter data (e.g., network access counters, error codes) which can be provided or queried from a learning or status component within the asset; and/or monitor and learn about substantially any data type or pattern that may be retrieved from the network and/or the asset.
- the type of requests e.g., read/write, role/identity of person/system requesting access, time of requests
- status or counter data e.g., network access counters, error codes
- the learning component monitors the automation network and/or assets for detected deviations from data patterns learned during the training period.
- a user interface can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn). For example, if the number of network requests to the asset has been monitored and learned to be about 1000 requests per hour during the past month, then a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks if the number of network requests to the asset exceeds 10% of the average daily network requests detected during the training period).
- Various learning functions and/or processes can be provided to facilitate automated learning within the learning components. This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example.
- artificial intelligence functions, components and/or processes can be provided.
- Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
- HMM Hidden Markov Models
- SVM Support Vector Machines
- FIG. 1 is a schematic block diagram illustrating automation security tools in accordance with an aspect of the present invention.
- FIG. 2 is a schematic block diagram illustrating a security analysis tool in accordance with an aspect of the present invention.
- FIG. 3 is a diagram illustrating an example security analyzer in accordance with an aspect of the present invention.
- FIG. 4 is a diagram illustrating an example security analysis schema in accordance with an aspect of the present invention.
- FIG. 5 is a diagram illustrating a validation system, methodology, and security validation tools in accordance with an aspect of the present invention.
- FIG. 6 is a schematic block diagram illustrating a validation analyzer in accordance with an aspect of the present invention.
- FIG. 7 is a schematic block diagram illustrating a security learning system in accordance with an aspect of the present invention.
- FIG. 8 is a diagram illustrating a learning component in accordance with an aspect of the present invention.
- FIG. 9 is a schematic block diagram illustrating a learning analyzer in accordance with an aspect of the present invention.
- FIG. 10 is a flow diagram illustrating security analysis processing in accordance with an aspect of the present invention.
- FIG. 11 is a flow diagram illustrating security validation processing in accordance with an aspect of the present invention.
- FIG. 12 is a flow diagram illustrating security learning and detection processing in accordance with an aspect of the present invention.
- the present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment.
- Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems.
- the security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network.
- the validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order.
- the security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
- an application running on a server and the server can be components.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, industrial controllers, and/or modules communicating therewith.
- a system 100 illustrates various automation security tools in accordance with an aspect of the present invention.
- One or more automation assets 120 communicate and cooperate with various network devices 124 across a network 130 .
- the automation assets 120 include substantially any type of control, communications module, computer, I/O device, Human Machine Interface (HMI) that communicate via the network 130 which includes control, automation, and/or public networks.
- the automation assets 120 include Programmable Logic Controllers (PLCs) that can also communicate to and control various other assets such as Input/Output modules including Analog, Digital, Programmed/Intelligent I/O modules, other programmable controllers, communications modules, and the like.
- PLCs Programmable Logic Controllers
- the network 130 includes public networks such as the Internet, Intranets, and automation networks such as Control and Information Protocol (CIP) networks including DeviceNet and ControlNet.
- Other networks 130 include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and so forth.
- the network devices 124 include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, intrusion detection systems, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
- VLAN virtual local area network
- WANs wide area network
- proxies proxies
- gateways gateways
- routers firewalls
- VPN virtual private network
- various security tools can be provided with the system 100 . Although three tools are illustrated, it is to be appreciated that more or less than three tools can be employed with the present invention and in a plurality of similar or different combinations.
- a security analysis tool 140 is provided that receives factory input data 144 describing or modeling various aspects of the automation assets 120 , network devices 124 , network 130 , and/or system 100 . The security analysis tool 140 processes the factory input data 144 and generates security output data 150 which is then deployed to machines and/or users in order to facilitate suitable network security measures and practices in the system 100 .
- such measures can include security recommendations, configuration guidelines or adjustments, procedures, rules, policies, and security parameters, for example, that are utilized to mitigate unwanted intrusions or attacks from the network 130 that may affect the automation assets 120 and/or network devices 124 .
- one or more validation tools 160 can be provided (can be host and/or networked based) that perform automated security auditing and checking functions on the network 130 , the automation assets 120 , and/or network devices 124 to determine if suitable security standards have been implemented.
- the validation tools also perform periodic or monitored assessments within the system 100 to determine if potential network threats or attacks are at hand. As will be described in more detail below, this can include automated and/or healing operations to mitigate network security threats.
- one or more learning tools 170 can be provided (can also be host and/or networked based) that learn system activities or patterns during a training or configuration period, then perform automated actions in response to detected deviations from the learned activities or patterns. Such automated actions can include altering network activity (e.g., preventing further network attempts to automation assets or network devices) and firing an alarm such as an e-mail or pager to notify an entity (user and/or machine) of a potential or detected problem.
- the security tools 140 , 150 and/or 160 can share or exchange information between tools.
- the security analysis tool 140 can receive input from the validation tool 160 (e.g., three new network devices detected in topology), wherein the security analysis tool generates new or adjusted security output data 150 in response thereto.
- the automation assets 120 may directly access the network 130 and/or may employ the network devices 124 to achieve network access.
- the security analysis tool 200 operates on a computer or workstation and receives one or more factory inputs 210 that can be generated from a plurality of sources. Such sources can include user input, model input (e.g., asset models, network models), schemas, formulas, equations, maps, and codes, for example.
- the factory inputs 210 are then processed by the security analysis tool 200 to generate one or more security outputs 220 which can also be provided in various forms such as manuals, documents, schemas, executables, codes, e-mails, and/or other electronic data that is described in more detail below.
- GUI Graphical User Interface 230
- interface application can be provided to interact with the security analysis tool 200 , factory inputs 210 , and/or security outputs 220 .
- This can include substantially any type of application that sends, retrieves, processes, and/or manipulates factory input data 210 , receives, displays, formats, and/or communicates security output data 220 , and/or facilitates operation of the security analysis tool 200 .
- interfaces 230 can also be associated with an engine, editor tool or web browser although other type applications can be utilized.
- the GUI 230 includes a display 234 having one or more display objects (not shown) including such aspects as configurable icons, buttons, sliders, input boxes, selection options, menus, tabs and so forth having multiple configurable dimensions, shapes, colors, text, data and sounds to facilitate operations with the security analysis tool 200 .
- the GUI 230 can also include a plurality of other inputs 240 or controls for adjusting and configuring one or more aspects of the present invention. This can include receiving user commands from a mouse, keyboard, speech input, web site, remote web service and/or other device such as a camera or video input to affect or modify operations of the GUI 230 .
- the security analyzer 300 can be an automated process, application, component, and/or tool that generates a set of security guidelines or security data 310 and executes a Security Analysis Method (SAM) in accordance with the present invention.
- SAM Security Analysis Method
- An input to the security analyzer 300 is an abstract description of a factory depicted as factory data 320 .
- the factory data 320 can describe or model one or more automation assets to be protected and associated network pathways to access the assets.
- Other factory data 320 can include risk data, cost data, security feedback from other security tools, network access patterns, and partitioning data, for example.
- Security data 310 generated by the security analyzer 300 includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, that is employed to guide users and adapt systems with various security measures.
- security analyzer 300 can also be modeled on a risk-based/cost-based approach, if desired.
- a suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost.
- security parameters, policies, and procedures for example, can be increased if lower security risks and associated costs are desired, whereas security measures can be decreased if higher risks and/or costs associated with network attacks or intrusions are deemed acceptable.
- descriptions of shop floor access, Intranet access, Internet access, wireless access and/or other network access patterns can also be described as factory data 320 and processed by the security analyzer 300 .
- the security analyzer 300 can be adapted for partitioned security specification entry and sign-off.
- the security data 310 can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired.
- a security analysis schema 330 which is described in more detail below, can be derived from the security data 310 and can be provided to other entities such as users or machines for further security processing/implementations.
- FIG. 4 illustrates an exemplary schema that may be employed for security deployments, communications, and configurations in accordance with the present invention.
- the schema represents one possible manner in which to transfer data to and from an entity such as a user, interface, file, an automation component and associated network devices, it is to be appreciated that other possible data transfer mechanisms may be employed.
- data can be transmitted in the form of binary or other type data packets that convey information in accordance with the present invention.
- the security analysis schema 400 includes one or more XML elements 410 through 440 (defined by starting and ending tags with ( ⁇ /> symbols), arranged in substantially any order) that relate to one or more security items or data and provide information to facilitate security guidelines and configurations.
- the security analysis schema 400 can then be deployed to various systems and/or components to control/adapt network access based upon the security contents specified therein.
- a recommendations element can be provided having associated recommendations data. This can include suggestions as to how to adapt automation components and network devices for suitable security measures (e.g., in view of risk and cost criteria).
- a suggestion can be in the form of a statement “All real time control devices and networks should only be connected to public networks via front-end server having virus detection, intrusion detection, and virtual private network capabilities.”
- “Remote factory network devices must be identified, authorized, and authenticated before achieving access to control network, otherwise, local factory network devices should communicate with low-end encryption technologies.”
- a plurality of such recommendations can be provided.
- a topologies element can be provided.
- topology data 414 can be in the form of symbols or codes that are employed to construct topology or network maps/displays via a visual or other type application.
- configuration data can be provided.
- This type of data can include settings or parameters for adapting network components with suitable security measures (e.g., communications module word three should be set to value 03 AA Hex for extended security checking, set dip switch two on gateway to cause authentication and authorization procedures with outside network devices, install virus detection software on network server . . . ).
- the configuration data can be sent or deployed to devices via the schema 400 and loaded to cause automatic configurations.
- an applications procedure element can be provided having associated procedure data.
- Such data can include the types of security applications to load, any security adjustments or settings relating to the applications, application status information to verify, and procedures for correctly operating respective security applications to mitigate potential attacks or threats.
- policy data can be provided.
- the policy can be general and/or specific, applied system wide and/or to a device or subset of devices. For example location-based policies can be initiated (e.g., all network requests from listed URL's are to be denied, network requests from Pittsburgh server limited to 100 per day). Time-based policies can also be defined (e.g., no outside network requests allowed between 10:00 AM and 2:00 PM). Process-based policies can be defined such as for example, “Limit outside network requests to below 50 during real time batch operations.” Other policies include load-based policies, whereby network requests that are responded to are regulated in accordance with an amount of desired network traffic (e.g., regulated according to requests/hour).
- location-based policies can be initiated (e.g., all network requests from listed URL's are to be denied, network requests from Pittsburgh server limited to 100 per day). Time-based policies can also be defined (e.g., no outside network requests allowed between 10:00 AM and 2:00 PM). Process-based policies can be defined such as for example, “Limit outside
- policies may be related to the type of requests (e.g., all requests to write data to the PLC are to be denied, outside devices cannot update analog module configuration data, communications module to provide status data only).
- substantially any policy that defines, regulates, and/or limits network activities in view of security considerations can be employed with the present invention.
- one or more security rules can be provided that have similar effects as the policies described above.
- rules can be provided in an If/Then construct (can include else, else if, Boolean expressions and the like), wherein if a defined condition or conditions occur, then one or more listed actions result (can included nested constructs) (e.g., If more than 3 network access attempts are negotiated unsuccessfully, then deny further communications with node or address).
- user procedure data can be provided. This can include actual procedure data and/or links to databases or websites to acquire the data. Such data can instruct users on suitable security procedures, security precautions, training, configurations, examples, wizards, manuals, trouble shooting, emergency contacts, contact information, maintenance, and the like which are designed to mitigate system security problems.
- FIG. 5 illustrates a validation system 500 , methodology, and validation tools 550 , 560 in accordance with an aspect of the present invention.
- the validation tools 550 and 560 perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified.
- One aspect of the tools is to check the system 500 prior to proposed or attempted security modifications in order to assess current security levels.
- Another aspect is to check the system 500 for conformance—to the recommendations of a security analysis tool described above, and/or against standards such as ISO, for example.
- the validation tools 550 and 560 can be executed on end devices 570 (host based), and/or executed as an independent device 580 that is attached to a network 590 (network based) at selected points.
- One function of the host-validation tool 550 is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
- One function of the network validation tool 560 is to perform vulnerability scanning and auditing on the networks 590 . This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services.
- the tools 550 and 560 can also attempt to gain key identity information about end devices that may enable hacker entry.
- Another function of the network validation tool 560 is to perform vulnerability scanning and auditing on firewalls, routers, and/or other security devices.
- a complementary tool can be provided to assess CIP-based factory automation systems for security (includes substantially any factory protocol). This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices.
- the network validation tool 560 can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still yet other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
- the validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters, install new security components, remove suspicious components, and so forth). It is to be appreciated that one or more of the functions described herein for the host validation tool 550 may be shared/interchanged with the network validation tool 560 , and visa versa.
- the validation analyzer 600 can be a hardware device, computer, processor, application, and/or combination thereof that process one or more security data inputs 610 such as can be received or communicated from a network (not shown).
- the security data inputs 610 include current security data, network data, audit data, device data, security analysis data, and/or other data that can be derived from scanning or querying a network and associated devices via the validation analyzer 600 for information regarding current network security conditions.
- Various components can be provided with the validation analyzer 600 to facilitate security monitoring and processing.
- an assessment component 620 can be provided.
- the assessment component 620 performs initial and/or periodic security determinations on network systems to identify security deficiencies or problems therein. For example, the assessment component 620 may compare a stored security configuration with a network configuration received from the security data inputs 610 , flag such conditions, and/or institute further actions if differences are detected.
- a standards component 624 can be provided to perform security compliance checking. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific standards, for example. Such checking can be in accordance with stored standards or procedures within the validation analyzer 600 , or can include remote checking to such resources as network databases, web sites, web services (e.g., databases linked to Internet Protocol Security Standard, IEEE database). It is noted that the assessment component 620 and/or standards component 624 can initiate vulnerability scanning and/or auditing on devices/networks/systems.
- such checking can include comparisons to local/remote databases or sites as noted above.
- a learning/analyzer component 628 can optionally be provided within the validation analyzer 600 .
- This component can be adapted to learn network, device, and/or system patterns, scan current network data, and process the current network data in accordance with the learned patterns to possibly initiate other automated actions.
- the learning/analyzer component 628 will be described in more detail below with respect to FIGS. 7-9 .
- a flag or event can be fired that triggers an automated action component 650 , wherein one or more automated security actions can be initiated.
- the automated security actions can include automatically correcting security problems at 654 such as automatically adjusting security parameters, altering network traffic patterns at 658 (e.g., increasing/decreasing communications with a node), installing new security components and/or removing/disabling suspicious components at 662 , firing alarms, and/or automatically notifying entities about detected problems and/or concerns at 670 , and/or generating security data at 674 such as generating an error or log file, generating a schema, generating data to re-configure or re-route network connections, updating a database or remote site, for example.
- the validation analyzer 600 can be configured and interacted with via a user interface 680 having similar input and output functionality as described above with respect to the user interface depicted in FIG. 2 .
- FIG. 7 illustrates a security learning system 700 in accordance with an aspect of the present invention.
- the security learning system 700 that can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to FIG. 5 .
- a network-based security learning system 710 (also referred to as learning component 710 ) is provided that monitors an automation network 714 during a predetermined training period (e.g., monitor network activities for 1 month).
- the learning component 710 monitors and learns activities or patterns such as:
- Network activities can also include network requests that are received from outside networks 730 that may be routed through a security gateway or server 734 before reaching the automation network 714 .
- the learning component 710 monitors the automation network 714 and/or assets 720 for detected deviations from data patterns learned during the training period. If desired, a user interface (not shown) can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn).
- a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks 730 if the number of network requests to the asset 720 exceeds a set or determined percentage of the average daily network requests detected during the training period).
- the learning component 710 and associated detection parameters or thresholds can be provided as a network-based tool or tools that can reside at various portions of the automation network 714 .
- the learning component can be provided as a host-based component as illustrated at 724 —depending on the resources available for the asset 720 .
- Various learning functions and/or processes can be provided to facilitate automated learning within the learning components 710 and 724 .
- This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example.
- artificial intelligence functions, components and/or processes can be provided.
- Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
- HMM Hidden Markov Models
- SVM Support Vector Machines
- FIG. 8 illustrates a learning component 800 in accordance with an aspect of the present invention.
- the learning component 800 can be configured with various data types, circuits, algorithms, applications, and so forth that are adapted to learn from data or events generated from a training data set 810 .
- the training data set 810 is derived by monitoring network or device activities over a predetermined timeframe. Such activities include network events, network data, network device activities, automations asset activities, and monitoring status information, for example.
- the activities can also include network access patterns, network attempts, network sources, data transfer and exchange activities, network/device load considerations, time considerations, and location considerations, for example (e.g., what time does heaviest network traffic occur, where do most network requests originate, what regions do most hacking attempts originate).
- the learning component 800 includes one or more learning models 820 and/or learning variables 830 .
- the learning models 820 can include such aspects as neural network functions, inference models, mathematical models, statistical models, probabilistic models, classifiers, and so forth that learn network patterns or occurrences from the training data 810 .
- the learning models can be adapted similarly (e.g., all models configured as Hidden Markov Models) or adapted in various combinations (e.g., 40 models configured as a neural network, three models adapted in a Bayesian configuration, one model configured as a vector-based classifier).
- the learning variables 830 can be focused on selected events or circumstances.
- a network load variable may record the average number of outside network requests per hour.
- a PLC variable may record the average number of network retries that an associated PLC experiences in a given timeframe, whereas another PLC variable records the maximum number of network retries that the PLC experienced during the same timeframe.
- the learning variables 820 may be employed as counters to record amounts for various events (e.g., record the number of PLC network transfers to I/O device over the last hour). As can be appreciated, a plurality of such variables can be defined and updated to log various network events during a selected training period. After training, the learning component 810 stores learned patterns or events that are then employed by a learning analyzer component described below to monitor and detect network security problems or identify potential security issues.
- FIG. 9 illustrates a learning analyzer 900 in accordance with an aspect of the present invention.
- the learning analyzer 900 monitors current network and/or device data 910 , determines whether the current data is within tolerance of historical data patterns that were previously learned/recorded, and initiates one or more automated actions 920 if current data 910 including trends derived therefrom are determined outside of the tolerance. These determinations can be achieved via a comparison analyzer 930 that compares learned data patterns with current data patterns 944 in accordance with threshold and/or range data illustrated at 950 . For example, a learned pattern 940 could be that between 11:00 and 12:00, network load between four network devices is about ten million data packet transfers.
- the comparison analyzer 930 would detect this overload (e.g., via subtraction of current and learned data, then comparing to threshold data) and initiate the automated actions 920 .
- the automated actions 920 can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing/disabling suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or concerns among other actions, for example.
- security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing/disabling suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or concerns among other actions, for example.
- the threshold data 950 can include range data thus providing upper and lower thresholds for given patterns.
- a range can be specified to detect events that occur within or outside the selected range.
- a range may have been specified as plus and minus one million transfers (do not have to be equidistant ranges), thus if current data patterns were detected to be above eleven million or below nine million transfers, then an automated action 920 would be initiated by the comparison analyzer 930 if current data patterns were outside the selected range of 10 million, +/ ⁇ 1 million transfers.
- a plurality of thresholds and/or ranges 950 can be specified.
- threshold and range data 950 can be specified in various formats (e.g., in accordance with standard deviation), and can include dynamically adjustable thresholds or ranges (e.g., set threshold high in the morning and lower in the afternoon, change threshold according to real time processing requirements).
- the comparison analyzer 930 can also monitor, analyze, and detect deviations of stored variables 960 and current variables 964 in view of the threshold and range data 950 .
- a user interface 970 having similar display/input functionality as previously described, can be provided to specify/adjust the threshold and/or range data 950 .
- the user interface 970 can also interact with and control the learning analyzer 900 (e.g., set threshold or ranges, add, remove, adjust learning models, view analyzer status, configure automated actions, monitor variables, adjust variables, generate security reports and the like).
- FIGS. 10-12 illustrate security methodologies in accordance with an aspect the present invention. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the present invention is not limited by the order of acts, as some acts may, in accordance with the present invention, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the present invention.
- FIG. 10 illustrates a security analysis process 1000 in accordance with an aspect of the present invention.
- factory descriptions of automation assets, network devices, network topologies, and/or other factory data are generated.
- Such data can include an abstract description of a factory, models, equations, maps, and network pathways to access the automation assets.
- the descriptions can also include risk data, cost data, security data from other security tools, and partitioning or user data, for example.
- the factory descriptions are processed such as via an object, application, security engine, ASIC, computer, web service, and so forth.
- security output data is determined in accordance with the factory descriptions and processing described above.
- the security output data can include a set or subset of recommended security components, codes, parameters, settings, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, as noted above.
- security output data is generated that can be automatically deployed to one or more entities such as users or devices in order to implement various security measures within an automation environment (e.g., data file or schema generated to automatically configure devices, provide user training and precautions, provide security configurations and topologies).
- entities employ the security data to mitigate network security issues such as unwanted network access and/or network attack.
- FIG. 11 illustrates a security validation process 1100 in accordance with an aspect of the present invention and includes host-based and/or network based processing as noted above.
- security assessments are performed. This can include initial and/or periodic live security assessment of a physical system to identify security flaws or weaknesses.
- security compliance tests are performed. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific guidelines, for example.
- vulnerability scanning and/or auditing on devices/networks is performed. This includes revision checks, improper configuration checks, file system/registry/database permissions checks, user privilege/password and/or account policy checks, checking for susceptibility to common network-based attacks, searching for open network ports, scanning for vulnerable network services, learning identity information about end devices/users that may enable hacker entry, performing vulnerability scanning and auditing on firewalls, routers, and/or other security devices, non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
- a determination is made as to whether security issues have been detected such as in accordance with the assessments, compliance testing, and scanning/auditing described above.
- the process proceeds back to 1110 . If security issues are detected at 1124 , the process proceeds to 1134 .
- one or more automated security actions are performed to mitigate security threats. This can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions. After automated processing at 1134 , the process proceeds back to 1110 for further security processing, analysis, scanning, and detection.
- FIG. 12 illustrates a security learning and detection process 1200 in accordance with an aspect of the present invention and can also include network-based aspects and/or host-based aspects as noted above.
- one or more learning components such as learning models, learning systems, parameters, and/or variables are defined that describe various network and/or system properties. Such components can be adapted to determine statistical or pattern information regarding network and system activities.
- This information can include the number, quantity or average of network requests to and from one or more assets or network devices, the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests, location of requests), status or counter data (e.g., network access counters, error codes), and/or substantially any data type or pattern that may be retrieved from a network, automation asset, or network device.
- system learning is performed. This includes monitoring an automation network during a predetermined training period, wherein the learning components described above acquire information about network, system, user, and/or device activities during the training period. For example, a counter variable may learn the average number of network requests that are sent to an automation asset in a given time period (can also be other statistical measures than average).
- an intelligent component such as a Bayesian inference model, probability determination, or neural network learns patterns such as “During heaviest network loads, the PLC responds to 25% fewer requests, and during real time processing operations, 35% fewer requests for a maximum of 23 requests per minute processed during such periods, +/ ⁇ 1 standard deviation.”
- learned patterns are compared to current data patterns in view of predetermined threshold or range settings at 1218 .
- the mean number of factory network packets transmitted is learned to be about 20,000 bytes per/second, +/ ⁇ 5000 bytes, and a range is set up so that if network traffic goes above 26,000 bytes per second or below 10,000 bytes per second, then system security performance is considered acceptable as long as network traffic remains in the selected range.
- thresholds/ranges can be set according to user desires, automated determinations, and/or according to the amount of risk and/or costs that are deemed acceptable (e.g., for lesser amount of security risk, set thresholds closer to learned patterns).
- security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions (e.g., sending an e
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Automation & Control Theory (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Testing And Monitoring For Control Systems (AREA)
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/661,696 US8909926B2 (en) | 2002-10-21 | 2003-09-12 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
EP03023916.4A EP1420317B1 (fr) | 2002-10-21 | 2003-10-21 | Système et procédé d'analyse de sécurité dans un système d'automatisation, de validation et d'apprentissage dans un environnement de commande industriel |
US13/593,037 US9009084B2 (en) | 2002-10-21 | 2012-08-23 | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US14/535,291 US20150067844A1 (en) | 2002-10-21 | 2014-11-06 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US14/681,026 US9412073B2 (en) | 2002-10-21 | 2015-04-07 | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US15/213,788 US10862902B2 (en) | 2002-10-21 | 2016-07-19 | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US42000602P | 2002-10-21 | 2002-10-21 | |
US10/661,696 US8909926B2 (en) | 2002-10-21 | 2003-09-12 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/593,037 Continuation-In-Part US9009084B2 (en) | 2002-10-21 | 2012-08-23 | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US14/535,291 Continuation US20150067844A1 (en) | 2002-10-21 | 2014-11-06 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040117624A1 US20040117624A1 (en) | 2004-06-17 |
US8909926B2 true US8909926B2 (en) | 2014-12-09 |
Family
ID=32511422
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/661,696 Active 2029-12-06 US8909926B2 (en) | 2002-10-21 | 2003-09-12 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US14/535,291 Abandoned US20150067844A1 (en) | 2002-10-21 | 2014-11-06 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/535,291 Abandoned US20150067844A1 (en) | 2002-10-21 | 2014-11-06 | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
Country Status (2)
Country | Link |
---|---|
US (2) | US8909926B2 (fr) |
EP (1) | EP1420317B1 (fr) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140277612A1 (en) * | 2013-03-14 | 2014-09-18 | General Electric Company | Automatic generation of a dynamic pre-start checklist |
US20140343732A1 (en) * | 2012-02-01 | 2014-11-20 | Abb Research Ltd. | Dynamic configuration of an industrial control system |
US20150213369A1 (en) * | 2002-10-21 | 2015-07-30 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US20150222666A1 (en) * | 2014-02-06 | 2015-08-06 | Vmware, Inc. | OWL-Based Intelligent Security Audit |
US20150370235A1 (en) * | 2013-03-31 | 2015-12-24 | Schneider Electric USA, Inc. | Analyzing scada systems |
US20170061514A1 (en) * | 2012-10-17 | 2017-03-02 | Wal-Mart Stores, Inc. | Http parallel processing router |
US9825765B2 (en) | 2015-03-31 | 2017-11-21 | Duo Security, Inc. | Method for distributed trust authentication |
US9998282B2 (en) | 2013-10-30 | 2018-06-12 | Duo Security, Inc. | System and methods for opportunistic cryptographic key management on an electronic device |
US10318903B2 (en) | 2016-05-06 | 2019-06-11 | General Electric Company | Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control |
US10901521B2 (en) | 2014-01-31 | 2021-01-26 | Nanotronics Imaging, Inc. | Apparatus and method for manipulating objects with gesture controls |
US11083919B2 (en) | 2019-05-29 | 2021-08-10 | Honeywell International Inc. | Operating a fire control system |
US11086988B1 (en) | 2020-02-28 | 2021-08-10 | Nanotronics Imaging, Inc. | Method, systems and apparatus for intelligently emulating factory control systems and simulating response data |
US11102091B2 (en) | 2013-03-31 | 2021-08-24 | Schneider Electric USA, Inc. | Analyzing SCADA systems |
US11100221B2 (en) | 2019-10-08 | 2021-08-24 | Nanotronics Imaging, Inc. | Dynamic monitoring and securing of factory processes, equipment and automated systems |
US11117328B2 (en) | 2019-09-10 | 2021-09-14 | Nanotronics Imaging, Inc. | Systems, methods, and media for manufacturing processes |
US11138869B2 (en) | 2019-04-24 | 2021-10-05 | Carrier Corporation | Alarm system |
US11153152B2 (en) | 2018-11-21 | 2021-10-19 | Cisco Technology, Inc. | System and methods to validate issue detection and classification in a network assurance system |
US11156991B2 (en) | 2019-06-24 | 2021-10-26 | Nanotronics Imaging, Inc. | Predictive process control for a manufacturing process |
US11163890B2 (en) | 2019-10-09 | 2021-11-02 | United States Of America As Represented By The Secretary Of The Navy | Self-targeting method of automated cybersecurity analysis on an operating system |
US11251970B2 (en) * | 2016-10-18 | 2022-02-15 | Cybernetica As | Composite digital signatures |
US11252046B2 (en) * | 2018-12-14 | 2022-02-15 | Juniper Networks, Inc. | System for identifying and assisting in the creation and implementation of a network service configuration using Hidden Markov Models (HMMs) |
US11265338B2 (en) | 2018-06-06 | 2022-03-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11731368B2 (en) | 2018-04-02 | 2023-08-22 | Nanotronics Imaging, Inc. | Systems, methods, and media for artificial intelligence process control in additive manufacturing |
US11968240B2 (en) * | 2019-03-04 | 2024-04-23 | Cisco Technology, Inc. | Network posture based suggestion of applications and services |
Families Citing this family (334)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070112512A1 (en) * | 1987-09-28 | 2007-05-17 | Verizon Corporate Services Group Inc. | Methods and systems for locating source of computer-originated attack based on GPS equipped computing device |
US7708189B1 (en) | 2002-05-17 | 2010-05-04 | Cipriano Joseph J | Identification verification system and method |
US7467018B1 (en) | 2002-11-18 | 2008-12-16 | Rockwell Automation Technologies, Inc. | Embedded database systems and methods in an industrial controller environment |
US7143095B2 (en) * | 2002-12-31 | 2006-11-28 | American Express Travel Related Services Company, Inc. | Method and system for implementing and managing an enterprise identity management for distributed security |
US20110202565A1 (en) * | 2002-12-31 | 2011-08-18 | American Express Travel Related Services Company, Inc. | Method and system for implementing and managing an enterprise identity management for distributed security in a computer system |
CA2513498C (fr) * | 2003-01-22 | 2011-10-11 | Nimcat Networks Inc. | Systemes de transfert d'appels, procedes et dispositifs de reseau |
US7529754B2 (en) | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
US7185015B2 (en) * | 2003-03-14 | 2007-02-27 | Websense, Inc. | System and method of monitoring and controlling application files |
US20040210773A1 (en) * | 2003-04-16 | 2004-10-21 | Charles Markosi | System and method for network security |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US7068161B2 (en) * | 2003-07-31 | 2006-06-27 | Ch2M Hill, Inc. | Method and system for analyzing the security of a facility |
US7194446B1 (en) * | 2003-09-25 | 2007-03-20 | Rockwell Automation Technologies, Inc. | Location-based execution of software/HMI |
US7483986B2 (en) * | 2003-12-03 | 2009-01-27 | International Business Machines Corporation | Dynamically tuning networks of relationships in self-organizing multi-agent systems |
US8190723B2 (en) * | 2003-12-14 | 2012-05-29 | Cisco Technology, Inc. | Method and system for automatically determining commands for a network element |
US8983966B2 (en) * | 2004-02-27 | 2015-03-17 | Ebay Inc. | Method and system to monitor a diverse heterogeneous application environment |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8566946B1 (en) | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US7860874B2 (en) * | 2004-06-08 | 2010-12-28 | Siemens Industry, Inc. | Method for searching across a PLC network |
US20060015591A1 (en) * | 2004-06-08 | 2006-01-19 | Datla Krishnam R | Apparatus and method for intelligent configuration editor |
US7735140B2 (en) * | 2004-06-08 | 2010-06-08 | Cisco Technology, Inc. | Method and apparatus providing unified compliant network audit |
US8010952B2 (en) * | 2004-06-08 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for configuration syntax and semantic validation |
US7721304B2 (en) | 2004-06-08 | 2010-05-18 | Cisco Technology, Inc. | Method and apparatus providing programmable network intelligence |
EP1612639A1 (fr) * | 2004-06-30 | 2006-01-04 | ST Incard S.r.l. | Méthode de détection et de réaction contre une attaque potentielle d'une opération exécutée par un jeton ou une carte cryptographique et visant à faire respecter la sécurité. |
US7607166B2 (en) * | 2004-07-12 | 2009-10-20 | Cisco Technology, Inc. | Secure manufacturing devices in a switched Ethernet network |
US8091130B1 (en) * | 2004-08-12 | 2012-01-03 | Verizon Corporate Services Group Inc. | Geographical intrusion response prioritization mapping system |
US8418246B2 (en) * | 2004-08-12 | 2013-04-09 | Verizon Patent And Licensing Inc. | Geographical threat response prioritization mapping system and methods of use |
US8082506B1 (en) * | 2004-08-12 | 2011-12-20 | Verizon Corporate Services Group Inc. | Geographical vulnerability mitigation response mapping system |
US8631493B2 (en) * | 2004-08-12 | 2014-01-14 | Verizon Patent And Licensing Inc. | Geographical intrusion mapping system using telecommunication billing and inventory systems |
US8572734B2 (en) * | 2004-08-12 | 2013-10-29 | Verizon Patent And Licensing Inc. | Geographical intrusion response prioritization mapping through authentication and flight data correlation |
US20060034305A1 (en) * | 2004-08-13 | 2006-02-16 | Honeywell International Inc. | Anomaly-based intrusion detection |
US7950044B2 (en) * | 2004-09-28 | 2011-05-24 | Rockwell Automation Technologies, Inc. | Centrally managed proxy-based security for legacy automation systems |
US7861085B1 (en) * | 2004-09-29 | 2010-12-28 | Rockwell Automation Technologies, Inc. | Systems and methods providing distributed management of electronic signatures in industrial automation systems |
US7979706B1 (en) | 2004-09-29 | 2011-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for queuing an action in industrial automation systems |
US8031913B1 (en) | 2004-09-29 | 2011-10-04 | Rockwell Automation Technologies, Inc. | Preemptive change verification via electronic signatures in industrial automation systems |
US8132225B2 (en) * | 2004-09-30 | 2012-03-06 | Rockwell Automation Technologies, Inc. | Scalable and flexible information security for industrial automation |
US8756521B1 (en) | 2004-09-30 | 2014-06-17 | Rockwell Automation Technologies, Inc. | Systems and methods for automatic visualization configuration |
EP1655647A1 (fr) * | 2004-11-04 | 2006-05-10 | Prüftechnik Dieter Busch Ag | Dispositif de liaison sécurisé destiné à des systèmes de gestion de contenus (CMS) basés sur Internet |
US7860318B2 (en) | 2004-11-09 | 2010-12-28 | Intelli-Check, Inc | System and method for comparing documents |
US8078881B1 (en) * | 2004-11-12 | 2011-12-13 | Liu Gary G | Password resetting method |
US7832005B1 (en) * | 2004-11-29 | 2010-11-09 | Symantec Corporation | Behavioral learning based security |
US7310669B2 (en) | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US20060164199A1 (en) * | 2005-01-26 | 2006-07-27 | Lockdown Networks, Inc. | Network appliance for securely quarantining a node on a network |
US8520512B2 (en) | 2005-01-26 | 2013-08-27 | Mcafee, Inc. | Network appliance for customizable quarantining of a node on a network |
US7810138B2 (en) * | 2005-01-26 | 2010-10-05 | Mcafee, Inc. | Enabling dynamic authentication with different protocols on the same port for a switch |
US8590011B1 (en) * | 2005-02-24 | 2013-11-19 | Versata Development Group, Inc. | Variable domain resource data security for data processing systems |
AT502241B1 (de) * | 2005-02-24 | 2007-04-15 | Arc Seibersdorf Res Gmbh | Verfahren und anordnung zur feststellung der abweichung von ermittelten werten |
US7706895B2 (en) | 2005-02-25 | 2010-04-27 | Rockwell Automation Technologies, Inc. | Reliable messaging instruction |
US7565351B1 (en) * | 2005-03-14 | 2009-07-21 | Rockwell Automation Technologies, Inc. | Automation device data interface |
CA2544681C (fr) * | 2005-04-22 | 2015-11-17 | Protexis Inc. | Systeme d'attribution de licence strictement localise ou base sur la distance |
US8799800B2 (en) * | 2005-05-13 | 2014-08-05 | Rockwell Automation Technologies, Inc. | Automatic user interface generation |
US7676281B2 (en) * | 2005-05-13 | 2010-03-09 | Rockwell Automation Technologies, Inc. | Distributed database in an industrial automation environment |
US7672737B2 (en) * | 2005-05-13 | 2010-03-02 | Rockwell Automation Technologies, Inc. | Hierarchically structured data model for utilization in industrial automation environments |
US7809683B2 (en) | 2005-05-13 | 2010-10-05 | Rockwell Automation Technologies, Inc. | Library that includes modifiable industrial automation objects |
US7650405B2 (en) * | 2005-05-13 | 2010-01-19 | Rockwell Automation Technologies, Inc. | Tracking and tracing across process boundaries in an industrial automation environment |
US8800042B2 (en) * | 2005-05-16 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Secure web application development and execution environment |
US7233830B1 (en) * | 2005-05-31 | 2007-06-19 | Rockwell Automation Technologies, Inc. | Application and service management for industrial control devices |
GB0512744D0 (en) * | 2005-06-22 | 2005-07-27 | Blackspider Technologies | Method and system for filtering electronic messages |
US20070019641A1 (en) * | 2005-07-22 | 2007-01-25 | Rockwell Automation Technologies, Inc. | Execution of industrial automation applications on communication infrastructure devices |
US8955032B2 (en) * | 2005-08-20 | 2015-02-10 | Riverbed Technology, Inc. | Assessing network and device compliance with security policies |
US7433741B2 (en) | 2005-09-30 | 2008-10-07 | Rockwell Automation Technologies, Inc. | Hybrid user interface having base presentation information with variably prominent supplemental information |
US8495743B2 (en) * | 2005-12-16 | 2013-07-23 | Cisco Technology, Inc. | Methods and apparatus providing automatic signature generation and enforcement |
US9286469B2 (en) * | 2005-12-16 | 2016-03-15 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic signature generation |
US7882560B2 (en) * | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
US8413245B2 (en) * | 2005-12-16 | 2013-04-02 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security for polymorphic attacks |
US8453243B2 (en) | 2005-12-28 | 2013-05-28 | Websense, Inc. | Real time lockdown |
US8832048B2 (en) * | 2005-12-29 | 2014-09-09 | Nextlabs, Inc. | Techniques and system to monitor and log access of information based on system and user context using policies |
US7787390B1 (en) * | 2006-01-30 | 2010-08-31 | Marvell International Ltd. | Custom automatic remote monitoring for network devices |
US7861003B2 (en) * | 2006-01-31 | 2010-12-28 | Genband Us Llc | Adaptive feedback for session over internet protocol |
US7860990B2 (en) * | 2006-01-31 | 2010-12-28 | Genband Us Llc | Session data records and related alarming within a session over internet protocol (SOIP) network |
US7865612B2 (en) | 2006-01-31 | 2011-01-04 | Genband Us Llc | Method and apparatus for partitioning resources within a session-over-internet-protocol (SoIP) session controller |
US20070204323A1 (en) * | 2006-02-24 | 2007-08-30 | Rockwell Automation Technologies, Inc. | Auto-detection capabilities for out of the box experience |
US8509218B2 (en) * | 2006-02-28 | 2013-08-13 | Genband Us Llc | Prioritization within a session over internet protocol (SOIP) network |
US8259706B2 (en) * | 2006-02-28 | 2012-09-04 | Genband Us Llc | Multistage prioritization of packets within a session over internet protocol (SOIP) network |
US7814069B2 (en) * | 2006-03-30 | 2010-10-12 | Oracle International Corporation | Wrapper for use with global standards compliance checkers |
US8185618B2 (en) | 2006-06-06 | 2012-05-22 | Cisco Technology, Inc. | Dynamically responding to non-network events at a network device in a computer network |
US7950056B1 (en) * | 2006-06-30 | 2011-05-24 | Symantec Corporation | Behavior based processing of a new version or variant of a previously characterized program |
PL1881388T3 (pl) * | 2006-07-07 | 2014-04-30 | Ansaldo Energia Spa | Urządzenie bezpieczeństwa instalacji przemysłowej oraz sposób monitorowania bezpieczeństwa instalacji przemysłowej |
US8359248B2 (en) * | 2006-08-24 | 2013-01-22 | Blue Pillar, Inc. | Systems, methods, and devices for managing emergency power supply systems |
US20080137266A1 (en) * | 2006-09-29 | 2008-06-12 | Rockwell Automation Technologies, Inc. | Motor control center with power and data distribution bus |
FR2907930B1 (fr) * | 2006-10-27 | 2009-02-13 | Viaccess Sa | Procede de detection d'une utilisation anormale d'un processeur de securite. |
US9654495B2 (en) * | 2006-12-01 | 2017-05-16 | Websense, Llc | System and method of analyzing web addresses |
US9008617B2 (en) * | 2006-12-28 | 2015-04-14 | Verizon Patent And Licensing Inc. | Layered graphical event mapping |
GB2458094A (en) | 2007-01-09 | 2009-09-09 | Surfcontrol On Demand Ltd | URL interception and categorization in firewalls |
GB2445764A (en) | 2007-01-22 | 2008-07-23 | Surfcontrol Plc | Resource access filtering system and database structure for use therewith |
EP2127311B1 (fr) * | 2007-02-02 | 2013-10-09 | Websense, Inc. | Système et procédé pour ajouter du contexte afin d'éviter les pertes de données sur un réseau informatique |
US9148437B1 (en) * | 2007-03-27 | 2015-09-29 | Amazon Technologies, Inc. | Detecting adverse network conditions for a third-party network site |
US8533841B2 (en) * | 2007-04-02 | 2013-09-10 | Microsoft Corporation | Deriving remediations from security compliance rules |
GB0709527D0 (en) | 2007-05-18 | 2007-06-27 | Surfcontrol Plc | Electronic messaging system, message processing apparatus and message processing method |
US7912062B2 (en) * | 2007-09-28 | 2011-03-22 | Genband Us Llc | Methods and apparatus for managing addresses related to virtual partitions of a session exchange device |
WO2009061855A2 (fr) * | 2007-11-05 | 2009-05-14 | Intelli-Check--Mobilisa, Inc. | Commande d'accès dynamique en réponse à des règles souples |
US8122510B2 (en) * | 2007-11-14 | 2012-02-21 | Bank Of America Corporation | Method for analyzing and managing unstructured data |
US20090144545A1 (en) * | 2007-11-29 | 2009-06-04 | International Business Machines Corporation | Computer system security using file system access pattern heuristics |
US8086582B1 (en) | 2007-12-18 | 2011-12-27 | Mcafee, Inc. | System, method and computer program product for scanning and indexing data for different purposes |
US8655822B2 (en) | 2008-03-12 | 2014-02-18 | Aptima, Inc. | Probabilistic decision making system and methods of use |
US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
US8407784B2 (en) * | 2008-03-19 | 2013-03-26 | Websense, Inc. | Method and system for protection against information stealing software |
US9130986B2 (en) | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
US8370948B2 (en) * | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
US20090319531A1 (en) * | 2008-06-20 | 2009-12-24 | Bong Jun Ko | Method and Apparatus for Detecting Devices Having Implementation Characteristics Different from Documented Characteristics |
EP2318955A1 (fr) | 2008-06-30 | 2011-05-11 | Websense, Inc. | Système et procédé pour une catégorisation dynamique et en temps réel de pages internet |
US20100064297A1 (en) * | 2008-09-05 | 2010-03-11 | Invensys Systems, Inc. | Configuring And Providing Enhanced Access To Profibus Device Diagnostic Data |
US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
EP2200249A1 (fr) * | 2008-12-17 | 2010-06-23 | Abb Research Ltd. | Analyse de réseau |
US8341748B2 (en) * | 2008-12-18 | 2012-12-25 | Caterpillar Inc. | Method and system to detect breaks in a border of a computer network |
CA2763513A1 (fr) | 2009-05-26 | 2010-12-02 | Roy Barkan | Systemes et procedes de detection efficace de donnees et d'informations a empreinte digitale |
US9489651B2 (en) | 2009-07-29 | 2016-11-08 | International Business Machines Corporation | Autonomic manufacturing operator authorization adjustment |
DE102010045256B4 (de) | 2009-09-14 | 2022-06-23 | Hirschmann Automation And Control Gmbh | Verfahren zum Betreiben eines Firewallgerätes in Automatisierungsnetzwerken |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US9392072B2 (en) | 2010-04-15 | 2016-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
US8484401B2 (en) | 2010-04-15 | 2013-07-09 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
US8984533B2 (en) | 2010-04-15 | 2015-03-17 | Rockwell Automation Technologies, Inc. | Systems and methods for conducting communications among components of multidomain industrial automation system |
EP2577938A1 (fr) * | 2010-06-01 | 2013-04-10 | Radiflow Ltd. | Réseau de communication d'usine |
US20120117656A1 (en) * | 2010-11-10 | 2012-05-10 | Sap Ag | Security Validation of Business Processes |
US8775607B2 (en) * | 2010-12-10 | 2014-07-08 | International Business Machines Corporation | Identifying stray assets in a computing enviroment and responsively taking resolution actions |
US20120159624A1 (en) * | 2010-12-21 | 2012-06-21 | Fujitsu Technology Solutions Intellectual Property Gmbh | Computer security method, system and model |
JP5739182B2 (ja) | 2011-02-04 | 2015-06-24 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 制御システム、方法およびプログラム |
JP5731223B2 (ja) | 2011-02-14 | 2015-06-10 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 異常検知装置、監視制御システム、異常検知方法、プログラムおよび記録媒体 |
JP5689333B2 (ja) | 2011-02-15 | 2015-03-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 異常検知システム、異常検知装置、異常検知方法、プログラムおよび記録媒体 |
US8893216B2 (en) * | 2011-06-15 | 2014-11-18 | Cisco Technology, Inc. | Security measures for the smart grid |
DE102011078309A1 (de) * | 2011-06-29 | 2013-01-03 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zum Überwachen eines VPN-Tunnels |
US8839349B2 (en) * | 2011-10-18 | 2014-09-16 | Mcafee, Inc. | Integrating security policy and event management |
US9594367B2 (en) * | 2011-10-31 | 2017-03-14 | Rockwell Automation Technologies, Inc. | Systems and methods for process control including process-initiated workflow |
US9032520B2 (en) * | 2012-02-22 | 2015-05-12 | iScanOnline, Inc. | Remote security self-assessment framework |
EP2640110B1 (fr) | 2012-03-12 | 2017-05-03 | Securitas Direct AB | Procédé et dispositif de commande d'un système domestique sans fil |
US8726393B2 (en) | 2012-04-23 | 2014-05-13 | Abb Technology Ag | Cyber security analyzer |
US10290221B2 (en) * | 2012-04-27 | 2019-05-14 | Aptima, Inc. | Systems and methods to customize student instruction |
US10552764B1 (en) | 2012-04-27 | 2020-02-04 | Aptima, Inc. | Machine learning system for a training model of an adaptive trainer |
US8863307B2 (en) * | 2012-06-05 | 2014-10-14 | Broadcom Corporation | Authenticating users based upon an identity footprint |
DE112012007061B4 (de) * | 2012-11-22 | 2016-09-08 | Mitsubishi Electric Corp. | Datensammel- und Übertragungsvorrichtung |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US9177139B2 (en) * | 2012-12-30 | 2015-11-03 | Honeywell International Inc. | Control system cyber security |
US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
US10438156B2 (en) | 2013-03-13 | 2019-10-08 | Aptima, Inc. | Systems and methods to provide training guidance |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9992230B1 (en) * | 2013-09-27 | 2018-06-05 | Tripwire, Inc. | Assessing security control quality and state in an information technology infrastructure |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US9921978B1 (en) | 2013-11-08 | 2018-03-20 | Fireeye, Inc. | System and method for enhanced security of storage devices |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9507935B2 (en) | 2014-01-16 | 2016-11-29 | Fireeye, Inc. | Exploit detection system with threat-aware microvisor |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US20150281008A1 (en) * | 2014-03-25 | 2015-10-01 | Emulex Corporation | Automatic derivation of system performance metric thresholds |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
US9438623B1 (en) | 2014-06-06 | 2016-09-06 | Fireeye, Inc. | Computer exploit detection using heap spray pattern matching |
US9973531B1 (en) | 2014-06-06 | 2018-05-15 | Fireeye, Inc. | Shellcode detection |
US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
KR20160002058A (ko) * | 2014-06-30 | 2016-01-07 | 한국전자통신연구원 | 모드버스 통신 패턴 학습에 기반한 비정상 트래픽 탐지 장치 및 방법 |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US9363280B1 (en) | 2014-08-22 | 2016-06-07 | Fireeye, Inc. | System and method of detecting delivery of malware using cross-customer data |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
US9787572B2 (en) * | 2014-10-07 | 2017-10-10 | Cisco Technology, Inc. | Conflict avoidant traffic routing in a network environment |
US10373409B2 (en) | 2014-10-31 | 2019-08-06 | Intellicheck, Inc. | Identification scan in compliance with jurisdictional or other rules |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9913201B1 (en) | 2015-01-29 | 2018-03-06 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
US10075475B2 (en) * | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Apparatus and method for dynamic customization of cyber-security risk item rules |
US9730075B1 (en) | 2015-02-09 | 2017-08-08 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
US10148688B1 (en) | 2015-02-09 | 2018-12-04 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
US9781604B1 (en) * | 2015-02-09 | 2017-10-03 | Symantec Corporation | Systems and methods for detecting illegitimate devices on wireless networks |
US10944764B2 (en) * | 2015-02-13 | 2021-03-09 | Fisher-Rosemount Systems, Inc. | Security event detection through virtual machine introspection |
US9882931B1 (en) | 2015-02-18 | 2018-01-30 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
US9781601B1 (en) | 2015-06-08 | 2017-10-03 | Symantec Corporation | Systems and methods for detecting potentially illegitimate wireless access points |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US10630649B2 (en) | 2015-06-30 | 2020-04-21 | K4Connect Inc. | Home automation system including encrypted device connection based upon publicly accessible connection file and related methods |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
WO2017004200A1 (fr) * | 2015-06-30 | 2017-01-05 | K4Connect Inc. | Système d'automatisation domestique comprenant un contrôleur de sécurité pour terminer des communications avec des dispositifs adressables au fonctionnement anormal et procédés associés |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10019572B1 (en) | 2015-08-27 | 2018-07-10 | Amazon Technologies, Inc. | Detecting malicious activities by imported software packages |
US10032031B1 (en) | 2015-08-27 | 2018-07-24 | Amazon Technologies, Inc. | Detecting unknown software vulnerabilities and system compromises |
US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
US10645167B2 (en) * | 2015-11-23 | 2020-05-05 | Cybirical, LLC | Distributed setting of network security devices from power system IED settings files |
US9918224B1 (en) | 2015-11-24 | 2018-03-13 | Symantec Corporation | Systems and methods for preventing computing devices from sending wireless probe packets |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10511481B1 (en) | 2015-12-15 | 2019-12-17 | Amazon Technologies, Inc. | Optimizing application configurations in a provider network |
US9652962B1 (en) * | 2015-12-21 | 2017-05-16 | General Electric Company | Systems and methods for safety and proximity sensing in industrial environments |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10616266B1 (en) | 2016-03-25 | 2020-04-07 | Fireeye, Inc. | Distributed malware detection system and submission workflow thereof |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10447540B2 (en) * | 2016-04-08 | 2019-10-15 | Cisco Technology, Inc. | Deriving a network policy for an industrial automation network |
US9935852B2 (en) * | 2016-06-06 | 2018-04-03 | General Electric Company | Methods and systems for network monitoring |
EP3258661B1 (fr) * | 2016-06-16 | 2020-11-18 | ABB Schweiz AG | Détection de changements de configuration anormale |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10348755B1 (en) | 2016-06-30 | 2019-07-09 | Symantec Corporation | Systems and methods for detecting network security deficiencies on endpoint devices |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US11042506B2 (en) * | 2016-07-20 | 2021-06-22 | Microsoft Technology Licensing, Llc | Compliance violation detection |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
DE102016222741A1 (de) | 2016-11-18 | 2018-05-24 | Continental Automotive Gmbh | Verfahren für ein Kommunikationsnetzwerk und elektronische Kontrolleinheit |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US10268170B2 (en) | 2017-01-03 | 2019-04-23 | General Electric Company | Validation of control command in substantially real time for industrial asset control system threat detection |
DE102017202002A1 (de) | 2017-02-08 | 2018-08-09 | Siemens Aktiengesellschaft | Verfahren und Computer zum kryptografischen Schützen von Steuerungskommunikation in und/oder Service-Zugang zu IT-Systemen, insbesondere im Zusammenhang mit der Diagnose und Konfiguration in einem Automatisierungs-, Steuerungs- oder Kontrollsystem |
EP3373544A1 (fr) * | 2017-03-07 | 2018-09-12 | ABB Schweiz AG | Renforcement de la sécurité de système de réseau de communication automatique |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10432647B2 (en) * | 2017-06-27 | 2019-10-01 | Honeywell International Inc. | Malicious industrial internet of things node activity detection for connected plants |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
EP3457286B1 (fr) * | 2017-09-14 | 2022-07-13 | ABB Schweiz AG | Procédé et dispositif informatique pour la mise en service d'un système de commande d'automatisation industrielle |
US10948883B2 (en) * | 2017-09-20 | 2021-03-16 | Rockwell Automation Technologies, Inc. | Machine logic characterization, modeling, and code generation |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
EP3474509B1 (fr) * | 2017-10-18 | 2021-10-06 | ABB Schweiz AG | Procédés de commande d'un dispositif et système de commande |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US10416661B2 (en) * | 2017-11-30 | 2019-09-17 | Abb Schweiz Ag | Apparatuses, systems and methods of secure cloud-based monitoring of industrial plants |
US10645121B1 (en) * | 2017-12-11 | 2020-05-05 | Juniper Networks, Inc. | Network traffic management based on network entity attributes |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US10841322B2 (en) | 2018-01-18 | 2020-11-17 | General Electric Company | Decision system and method for separating faults from attacks |
US10908940B1 (en) | 2018-02-26 | 2021-02-02 | Amazon Technologies, Inc. | Dynamically managed virtual server system |
EP3544262A1 (fr) * | 2018-03-22 | 2019-09-25 | Mitsubishi Electric R&D Centre Europe B.V. | Procédé d'amélioration de la sécurité dans un réseau d'automatisation d'usines |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
CN108521423A (zh) * | 2018-04-10 | 2018-09-11 | 江苏亨通工控安全研究院有限公司 | 半实物仿真工控网络靶场系统 |
US10867044B2 (en) * | 2018-05-30 | 2020-12-15 | AppOmni, Inc. | Automatic computer system change monitoring and security gap detection system |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
US11176251B1 (en) | 2018-12-21 | 2021-11-16 | Fireeye, Inc. | Determining malware via symbolic function hash analysis |
US11743290B2 (en) | 2018-12-21 | 2023-08-29 | Fireeye Security Holdings Us Llc | System and method for detecting cyberattacks impersonating legitimate sources |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11601444B1 (en) | 2018-12-31 | 2023-03-07 | Fireeye Security Holdings Us Llc | Automated system for triage of customer issues |
US11310238B1 (en) | 2019-03-26 | 2022-04-19 | FireEye Security Holdings, Inc. | System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources |
US11677786B1 (en) | 2019-03-29 | 2023-06-13 | Fireeye Security Holdings Us Llc | System and method for detecting and protecting against cybersecurity attacks on servers |
US11636198B1 (en) | 2019-03-30 | 2023-04-25 | Fireeye Security Holdings Us Llc | System and method for cybersecurity analyzer update and concurrent management system |
US11005822B2 (en) * | 2019-05-03 | 2021-05-11 | Cisco Technology, Inc. | Securing substation communications using security groups based on substation configurations |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
US11218360B2 (en) | 2019-12-09 | 2022-01-04 | Quest Automated Services, LLC | Automation system with edge computing |
US11436327B1 (en) | 2019-12-24 | 2022-09-06 | Fireeye Security Holdings Us Llc | System and method for circumventing evasive code for cyberthreat detection |
US11522884B1 (en) | 2019-12-24 | 2022-12-06 | Fireeye Security Holdings Us Llc | Subscription and key management system |
US11838300B1 (en) | 2019-12-24 | 2023-12-05 | Musarubra Us Llc | Run-time configurable cybersecurity system |
DE102020111450A1 (de) * | 2020-04-27 | 2021-10-28 | Bayerische Motoren Werke Aktiengesellschaft | Erkennen von Fehlern in einem Computernetzwerk |
DE102020209993A1 (de) * | 2020-08-06 | 2022-02-10 | Robert Bosch Gesellschaft mit beschränkter Haftung | Verfahren und Vorrichtung zur Verarbeitung von Daten eines technischen Systems |
EP4047898A1 (fr) * | 2021-02-17 | 2022-08-24 | ABB Schweiz AG | Défense de systèmes d'automatisation industrielle contre des attaques |
CN113098892B (zh) * | 2021-04-19 | 2023-04-18 | 恒安嘉新(北京)科技股份公司 | 基于工业互联网的数据防泄漏系统以及方法 |
CN113673966B (zh) * | 2021-09-03 | 2024-03-08 | 卡奥斯数字科技(青岛)有限公司 | 信息安全建设方案生成方法、装置、电子设备及存储介质 |
CN115081396A (zh) * | 2022-05-12 | 2022-09-20 | 中国南方电网有限责任公司 | 一种智能化修编作业文件的方法及装置 |
CN116760716B (zh) * | 2023-08-18 | 2023-11-03 | 南京天谷电气科技有限公司 | 一种新能源场站智能网络拓扑管理系统及方法 |
Citations (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US4882752A (en) | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5051837A (en) | 1990-06-06 | 1991-09-24 | Mcjunkin Thomas N | Home entertainment equipment control apparatus |
US5202997A (en) | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
US5371794A (en) | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5535276A (en) | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5539906A (en) | 1993-05-04 | 1996-07-23 | International Business Machines Corporation | Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process |
US5604914A (en) | 1991-07-10 | 1997-02-18 | Mitsubishi Denki Kabushiki Kaisha | Communication device for use with a factory automation network having multiple stations for accessing a factory automated device using address variables specific to the factory automated device |
US5917840A (en) | 1992-03-13 | 1999-06-29 | Foxboro Company | Protection against communications crosstalk in a factory process control system |
US5923756A (en) | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6088679A (en) | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6108785A (en) | 1997-03-31 | 2000-08-22 | Intel Corporation | Method and apparatus for preventing unauthorized usage of a computer system |
WO2001026335A2 (fr) | 1999-10-06 | 2001-04-12 | Sensoria Corporation | Procede et appareil de traitement de signaux distribues parmi des capteurs wins (wireless integrated network sensors) interconnectes par reseau |
US20010013098A1 (en) | 1997-08-29 | 2001-08-09 | Michael F. Angelo | Remote security technology |
US6298445B1 (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US20020006790A1 (en) | 1998-10-21 | 2002-01-17 | Werner Blumenstock | System and method for remote maintenance and/or remote diagnosis of an automation system by means of electronic mail |
US20020023231A1 (en) | 2000-07-28 | 2002-02-21 | Jan Pathuel | Method and system of securing data and systems |
US6374358B1 (en) * | 1998-08-05 | 2002-04-16 | Sun Microsystems, Inc. | Adaptive countermeasure selection method and apparatus |
GB2368701A (en) | 2000-06-16 | 2002-05-08 | Fisher Rosemount Systems Inc | Function-based process control verification and security |
US20020078153A1 (en) | 2000-11-02 | 2002-06-20 | Chit Chung | Providing secure, instantaneous, directory-integrated, multiparty, communications services |
US6421571B1 (en) | 2000-02-29 | 2002-07-16 | Bently Nevada Corporation | Industrial plant asset management system: apparatus and method |
US20020099959A1 (en) | 2000-11-13 | 2002-07-25 | Redlich Ron M. | Data security system and method responsive to electronic attacks |
US20020112152A1 (en) | 2001-02-12 | 2002-08-15 | Vanheyningen Marc D. | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols |
US20020147820A1 (en) | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
US20020152289A1 (en) | 1997-09-10 | 2002-10-17 | Schneider Automation Inc. | System and method for accessing devices in a factory automation network |
US20020161905A1 (en) | 2001-04-26 | 2002-10-31 | Nokia Corporation | IP security and mobile networking |
US20020163920A1 (en) | 2001-05-01 | 2002-11-07 | Walker Philip M. | Method and apparatus for providing network security |
US20020188870A1 (en) | 2001-06-11 | 2002-12-12 | Mcnc | Intrusion tolerant server system |
US20020199122A1 (en) | 2001-06-22 | 2002-12-26 | Davis Lauren B. | Computer security vulnerability analysis methodology |
US20030014500A1 (en) | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
US20030033516A1 (en) * | 2001-08-08 | 2003-02-13 | Michael Howard | Rapid application security threat analysis |
US6542993B1 (en) * | 1999-03-12 | 2003-04-01 | Lucent Technologies Inc. | Security management system and method |
US20030093521A1 (en) | 2001-11-09 | 2003-05-15 | Xerox Corporation. | Asset management system for network-based and non-network-based assets and information |
US6571141B1 (en) | 1995-05-30 | 2003-05-27 | Roy-G-Biv Corporation | Application programs for motion control devices including access limitations |
US20030105535A1 (en) | 2001-11-05 | 2003-06-05 | Roman Rammler | Unit controller with integral full-featured human-machine interface |
US20030126472A1 (en) | 2001-12-31 | 2003-07-03 | Banzhof Carl E. | Automated computer vulnerability resolution system |
US20030140094A1 (en) | 2002-01-24 | 2003-07-24 | David Collier | Methods and systems for management and control of an automation control module |
US6615258B1 (en) | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US20030200437A1 (en) | 2002-04-17 | 2003-10-23 | Kazuomi Oishi | Public key certification providing apparatus |
US20030221124A1 (en) | 2002-05-23 | 2003-11-27 | International Business Machines Corporation | File level security for a metadata controller in a storage area network |
US20030229812A1 (en) | 2002-06-05 | 2003-12-11 | Cristina Buchholz | Authorization mechanism |
US20030233573A1 (en) | 2002-06-18 | 2003-12-18 | Phinney Thomas L. | System and method for securing network communications |
US20040015619A1 (en) | 2002-07-18 | 2004-01-22 | International Business Machines Corporation | Method and system for monitoring the status and operation of devices from a central location |
US20040027875A1 (en) | 2001-09-27 | 2004-02-12 | Clemens Dinges | Dynamic access to automation resources |
US20040034774A1 (en) | 2002-08-15 | 2004-02-19 | Le Saint Eric F. | System and method for privilege delegation and control |
US20040049674A1 (en) | 2002-09-10 | 2004-03-11 | David Scott Collier | Methods and systems for management and control of an automation control module |
US20040059920A1 (en) * | 2002-09-19 | 2004-03-25 | International Business Machines Corporation | Security health checking tool |
US20040073800A1 (en) | 2002-05-22 | 2004-04-15 | Paragi Shah | Adaptive intrusion detection system |
US20040075590A1 (en) | 2002-09-25 | 2004-04-22 | Pearson Esther Mae | E-learning biometric identification information system |
US6735601B1 (en) | 2000-12-29 | 2004-05-11 | Vmware, Inc. | System and method for remote file access by computer |
US20040107345A1 (en) | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US20040125146A1 (en) | 2002-09-16 | 2004-07-01 | Siemens Aktiengesellschaft | System for detection and indication of a secure status of appliances |
US6760782B1 (en) | 2000-08-04 | 2004-07-06 | Schneider Automation Inc. | Apparatus for controlling internetwork communications |
US20040139353A1 (en) | 2002-11-19 | 2004-07-15 | Forcade Jonathan Brett | Methodology and system for real time information system application intrusion detection |
US20040153172A1 (en) | 2001-05-16 | 2004-08-05 | Robert Rousseau | Predictive diagnostic system in a programmable automaton |
US20040260954A1 (en) | 2003-06-19 | 2004-12-23 | Schneider Automation Inc. | Biometrics PLC access and control system and method |
US6842860B1 (en) | 1999-07-23 | 2005-01-11 | Networks Associates Technology, Inc. | System and method for selectively authenticating data |
US20050021839A1 (en) | 2003-06-23 | 2005-01-27 | Russell Thomas C. | Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites |
US20050091492A1 (en) | 2003-10-27 | 2005-04-28 | Benson Glenn S. | Portable security transaction protocol |
US6920558B2 (en) | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
US6944761B2 (en) | 1999-08-05 | 2005-09-13 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US20050228998A1 (en) | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US6957348B1 (en) | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US20050235148A1 (en) | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6961584B2 (en) | 2000-03-22 | 2005-11-01 | Mlr, Llc | Tiered wireless, multi-modal access system and method |
US6981142B1 (en) * | 1999-01-28 | 2005-12-27 | International Business Machines Corporation | Electronic access control system and method |
US7010590B1 (en) | 1999-09-15 | 2006-03-07 | Datawire Communications Networks, Inc. | System and method for secure transactions over a network |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US7020701B1 (en) | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
US7035898B1 (en) | 1997-09-10 | 2006-04-25 | Schneider Automation Inc. | System for programming a factory automation device using a web browser |
US20060095771A1 (en) | 2004-11-02 | 2006-05-04 | Guido Appenzeller | Security device for cryptographic communications |
US7047423B1 (en) * | 1998-07-21 | 2006-05-16 | Computer Associates Think, Inc. | Information security analysis system |
US7058154B1 (en) | 2000-08-08 | 2006-06-06 | General Electric Company | Systems and methods for managing assets using an interactive database |
US7089303B2 (en) * | 2000-05-31 | 2006-08-08 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
US7093121B2 (en) | 2002-01-10 | 2006-08-15 | Mcafee, Inc. | Transferring data via a secure network connection |
US7100196B2 (en) | 1996-02-22 | 2006-08-29 | Kvaser Consultant Ab | Device in a system operating with CAN-protocol and in a control and/or supervision system |
US20060206932A1 (en) | 2005-03-14 | 2006-09-14 | Microsoft Corporation | Trusted third party authentication for web services |
US7127526B1 (en) | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US7139843B1 (en) | 1995-05-30 | 2006-11-21 | Roy-G-Biv Corporation | System and methods for generating and communicating motion data through a distributed network |
US7193993B2 (en) | 2002-05-23 | 2007-03-20 | Intel Corporation | Integrated medium access control device and physical layer device |
US7254601B2 (en) | 2001-12-20 | 2007-08-07 | Questra Corporation | Method and apparatus for managing intelligent assets in a distributed environment |
US20080016569A1 (en) | 2000-10-10 | 2008-01-17 | Internet Security Systems, Inc. | Method and System for Creating a Record for One or More Computer Security Incidents |
US7349987B2 (en) | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US7370350B1 (en) | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
US7716489B1 (en) | 2004-09-29 | 2010-05-11 | Rockwell Automation Technologies, Inc. | Access control method for disconnected automation systems |
US7761460B1 (en) | 2004-02-04 | 2010-07-20 | Rockwell Automation Technologies, Inc. | Systems and methods that utilize a standard database interface to access data within an industrial device |
US7950044B2 (en) | 2004-09-28 | 2011-05-24 | Rockwell Automation Technologies, Inc. | Centrally managed proxy-based security for legacy automation systems |
US7990967B2 (en) | 2005-01-06 | 2011-08-02 | Rockwell Automation Technologies, Inc. | Firewall method and apparatus for industrial systems |
US8429393B1 (en) | 2004-09-30 | 2013-04-23 | Rockwell Automation Technologies, Inc. | Method for obscuring a control device's network presence by dynamically changing the device's network addresses using a cryptography-based pattern |
US8732658B2 (en) | 2006-09-29 | 2014-05-20 | Rockwell Automation Technologies, Inc. | Layered interface in an industrial environment |
US8776092B2 (en) | 2006-09-29 | 2014-07-08 | Rockwell Automation Technologies, Inc. | Multiple interface support |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4831582A (en) * | 1986-11-07 | 1989-05-16 | Allen-Bradley Company, Inc. | Database access machine for factory automation network |
US5903454A (en) * | 1991-12-23 | 1999-05-11 | Hoffberg; Linda Irene | Human-factored interface corporating adaptive pattern recognition based controller apparatus |
US5583928A (en) * | 1992-06-19 | 1996-12-10 | British Telecommunications Public Limited Company | Detecting local exchange failure and resultant control of a communications network |
US6272341B1 (en) * | 1995-11-30 | 2001-08-07 | Motient Services Inc. | Network engineering/systems engineering system for mobile satellite communication system |
US6169981B1 (en) * | 1996-06-04 | 2001-01-02 | Paul J. Werbos | 3-brain architecture for an intelligent decision and control system |
US5796721A (en) * | 1996-06-21 | 1998-08-18 | National Instruments Corporation | Method and system for monitoring fieldbus network with dynamically alterable packet filter |
US6023456A (en) * | 1996-12-23 | 2000-02-08 | Nortel Networks Corporation | Dynamic traffic conditioning |
US6732191B1 (en) * | 1997-09-10 | 2004-05-04 | Schneider Automation Inc. | Web interface to an input/output device |
US6321272B1 (en) * | 1997-09-10 | 2001-11-20 | Schneider Automation, Inc. | Apparatus for controlling internetwork communications |
JP3369445B2 (ja) * | 1997-09-22 | 2003-01-20 | 富士通株式会社 | ネットワークサービスサーバ負荷調整装置、方法および記録媒体 |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6035240A (en) * | 1998-11-12 | 2000-03-07 | Moorehead; Jack | Flexible distributed processing system for sensor data acquisition and control |
US7272815B1 (en) * | 1999-05-17 | 2007-09-18 | Invensys Systems, Inc. | Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects |
US6788980B1 (en) * | 1999-06-11 | 2004-09-07 | Invensys Systems, Inc. | Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network |
US6883101B1 (en) * | 2000-02-08 | 2005-04-19 | Harris Corporation | System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules |
US6930978B2 (en) * | 2000-05-17 | 2005-08-16 | Deep Nines, Inc. | System and method for traffic management control in a data transmission network |
US20020032871A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network |
SE518491C2 (sv) * | 2000-10-12 | 2002-10-15 | Abb Ab | Datorbaserat system och metod för behörighetskontroll av objekt |
US20020120728A1 (en) * | 2000-12-22 | 2002-08-29 | Jason Braatz | Method and apparatus for network-enablement of devices using device intelligence and network architecture |
US6871299B2 (en) * | 2001-02-05 | 2005-03-22 | Fisher-Rosemount Systems, Inc. | Hierarchical failure management for process control systems |
US7536548B1 (en) * | 2002-06-04 | 2009-05-19 | Rockwell Automation Technologies, Inc. | System and methodology providing multi-tier-security for network data exchange with industrial control components |
-
2003
- 2003-09-12 US US10/661,696 patent/US8909926B2/en active Active
- 2003-10-21 EP EP03023916.4A patent/EP1420317B1/fr not_active Expired - Lifetime
-
2014
- 2014-11-06 US US14/535,291 patent/US20150067844A1/en not_active Abandoned
Patent Citations (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4200770A (en) | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US5202997A (en) | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
US4882752A (en) | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US5051837A (en) | 1990-06-06 | 1991-09-24 | Mcjunkin Thomas N | Home entertainment equipment control apparatus |
US5604914A (en) | 1991-07-10 | 1997-02-18 | Mitsubishi Denki Kabushiki Kaisha | Communication device for use with a factory automation network having multiple stations for accessing a factory automated device using address variables specific to the factory automated device |
US5917840A (en) | 1992-03-13 | 1999-06-29 | Foxboro Company | Protection against communications crosstalk in a factory process control system |
US5539906A (en) | 1993-05-04 | 1996-07-23 | International Business Machines Corporation | Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process |
US5371794A (en) | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5535276A (en) | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US6571141B1 (en) | 1995-05-30 | 2003-05-27 | Roy-G-Biv Corporation | Application programs for motion control devices including access limitations |
US7139843B1 (en) | 1995-05-30 | 2006-11-21 | Roy-G-Biv Corporation | System and methods for generating and communicating motion data through a distributed network |
US7100196B2 (en) | 1996-02-22 | 2006-08-29 | Kvaser Consultant Ab | Device in a system operating with CAN-protocol and in a control and/or supervision system |
US5923756A (en) | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6108785A (en) | 1997-03-31 | 2000-08-22 | Intel Corporation | Method and apparatus for preventing unauthorized usage of a computer system |
US20010013098A1 (en) | 1997-08-29 | 2001-08-09 | Michael F. Angelo | Remote security technology |
US6418533B2 (en) | 1997-08-29 | 2002-07-09 | Compaq Information Technologies Group, L.P. | “J” system for securing a portable computer which optionally requires an entry of an invalid power on password (POP), by forcing an entry of a valid POP |
US7035898B1 (en) | 1997-09-10 | 2006-04-25 | Schneider Automation Inc. | System for programming a factory automation device using a web browser |
US20020152289A1 (en) | 1997-09-10 | 2002-10-17 | Schneider Automation Inc. | System and method for accessing devices in a factory automation network |
US6615258B1 (en) | 1997-09-26 | 2003-09-02 | Worldcom, Inc. | Integrated customer interface for web based data management |
US20040019808A1 (en) | 1997-09-26 | 2004-01-29 | Worldcom, Inc. | Secure customer interface for web based data management |
US6088679A (en) | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US20050235148A1 (en) | 1998-02-13 | 2005-10-20 | Scheidt Edward M | Access system utilizing multiple factor identification and authentication |
US6298445B1 (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US7047423B1 (en) * | 1998-07-21 | 2006-05-16 | Computer Associates Think, Inc. | Information security analysis system |
US6374358B1 (en) * | 1998-08-05 | 2002-04-16 | Sun Microsystems, Inc. | Adaptive countermeasure selection method and apparatus |
US20020006790A1 (en) | 1998-10-21 | 2002-01-17 | Werner Blumenstock | System and method for remote maintenance and/or remote diagnosis of an automation system by means of electronic mail |
US6981142B1 (en) * | 1999-01-28 | 2005-12-27 | International Business Machines Corporation | Electronic access control system and method |
US6542993B1 (en) * | 1999-03-12 | 2003-04-01 | Lucent Technologies Inc. | Security management system and method |
US6842860B1 (en) | 1999-07-23 | 2005-01-11 | Networks Associates Technology, Inc. | System and method for selectively authenticating data |
US6944761B2 (en) | 1999-08-05 | 2005-09-13 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US7010590B1 (en) | 1999-09-15 | 2006-03-07 | Datawire Communications Networks, Inc. | System and method for secure transactions over a network |
US7020701B1 (en) | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
WO2001026335A2 (fr) | 1999-10-06 | 2001-04-12 | Sensoria Corporation | Procede et appareil de traitement de signaux distribues parmi des capteurs wins (wireless integrated network sensors) interconnectes par reseau |
US6957348B1 (en) | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US6421571B1 (en) | 2000-02-29 | 2002-07-16 | Bently Nevada Corporation | Industrial plant asset management system: apparatus and method |
US7127526B1 (en) | 2000-03-20 | 2006-10-24 | Nortel Networks Limited | Method and apparatus for dynamically loading and managing software services on a network device |
US6961584B2 (en) | 2000-03-22 | 2005-11-01 | Mlr, Llc | Tiered wireless, multi-modal access system and method |
US7089303B2 (en) * | 2000-05-31 | 2006-08-08 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
GB2368701A (en) | 2000-06-16 | 2002-05-08 | Fisher Rosemount Systems Inc | Function-based process control verification and security |
US20020023231A1 (en) | 2000-07-28 | 2002-02-21 | Jan Pathuel | Method and system of securing data and systems |
US6760782B1 (en) | 2000-08-04 | 2004-07-06 | Schneider Automation Inc. | Apparatus for controlling internetwork communications |
US7058154B1 (en) | 2000-08-08 | 2006-06-06 | General Electric Company | Systems and methods for managing assets using an interactive database |
US20080016569A1 (en) | 2000-10-10 | 2008-01-17 | Internet Security Systems, Inc. | Method and System for Creating a Record for One or More Computer Security Incidents |
US20020078153A1 (en) | 2000-11-02 | 2002-06-20 | Chit Chung | Providing secure, instantaneous, directory-integrated, multiparty, communications services |
US20020099959A1 (en) | 2000-11-13 | 2002-07-25 | Redlich Ron M. | Data security system and method responsive to electronic attacks |
US7349987B2 (en) | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US6735601B1 (en) | 2000-12-29 | 2004-05-11 | Vmware, Inc. | System and method for remote file access by computer |
US20020112152A1 (en) | 2001-02-12 | 2002-08-15 | Vanheyningen Marc D. | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US6920558B2 (en) | 2001-03-20 | 2005-07-19 | Networks Associates Technology, Inc. | Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system |
US20020147820A1 (en) | 2001-04-06 | 2002-10-10 | Docomo Communications Laboratories Usa, Inc. | Method for implementing IP security in mobile IP networks |
US20020161905A1 (en) | 2001-04-26 | 2002-10-31 | Nokia Corporation | IP security and mobile networking |
US20020163920A1 (en) | 2001-05-01 | 2002-11-07 | Walker Philip M. | Method and apparatus for providing network security |
US20040153172A1 (en) | 2001-05-16 | 2004-08-05 | Robert Rousseau | Predictive diagnostic system in a programmable automaton |
US20020188870A1 (en) | 2001-06-11 | 2002-12-12 | Mcnc | Intrusion tolerant server system |
US20020199122A1 (en) | 2001-06-22 | 2002-12-26 | Davis Lauren B. | Computer security vulnerability analysis methodology |
US20030014500A1 (en) | 2001-07-10 | 2003-01-16 | Schleiss Trevor D. | Transactional data communications for process control systems |
US7162534B2 (en) | 2001-07-10 | 2007-01-09 | Fisher-Rosemount Systems, Inc. | Transactional data communications for process control systems |
US20030033516A1 (en) * | 2001-08-08 | 2003-02-13 | Michael Howard | Rapid application security threat analysis |
US20040027875A1 (en) | 2001-09-27 | 2004-02-12 | Clemens Dinges | Dynamic access to automation resources |
US20030105535A1 (en) | 2001-11-05 | 2003-06-05 | Roman Rammler | Unit controller with integral full-featured human-machine interface |
US20030093521A1 (en) | 2001-11-09 | 2003-05-15 | Xerox Corporation. | Asset management system for network-based and non-network-based assets and information |
US7254601B2 (en) | 2001-12-20 | 2007-08-07 | Questra Corporation | Method and apparatus for managing intelligent assets in a distributed environment |
US20030126472A1 (en) | 2001-12-31 | 2003-07-03 | Banzhof Carl E. | Automated computer vulnerability resolution system |
US7093121B2 (en) | 2002-01-10 | 2006-08-15 | Mcafee, Inc. | Transferring data via a secure network connection |
US20030140094A1 (en) | 2002-01-24 | 2003-07-24 | David Collier | Methods and systems for management and control of an automation control module |
US20030200437A1 (en) | 2002-04-17 | 2003-10-23 | Kazuomi Oishi | Public key certification providing apparatus |
US20040073800A1 (en) | 2002-05-22 | 2004-04-15 | Paragi Shah | Adaptive intrusion detection system |
US20030221124A1 (en) | 2002-05-23 | 2003-11-27 | International Business Machines Corporation | File level security for a metadata controller in a storage area network |
US7193993B2 (en) | 2002-05-23 | 2007-03-20 | Intel Corporation | Integrated medium access control device and physical layer device |
US20030229812A1 (en) | 2002-06-05 | 2003-12-11 | Cristina Buchholz | Authorization mechanism |
US20030233573A1 (en) | 2002-06-18 | 2003-12-18 | Phinney Thomas L. | System and method for securing network communications |
US7370350B1 (en) | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
US20040015619A1 (en) | 2002-07-18 | 2004-01-22 | International Business Machines Corporation | Method and system for monitoring the status and operation of devices from a central location |
US20040034774A1 (en) | 2002-08-15 | 2004-02-19 | Le Saint Eric F. | System and method for privilege delegation and control |
US20040049674A1 (en) | 2002-09-10 | 2004-03-11 | David Scott Collier | Methods and systems for management and control of an automation control module |
US20040125146A1 (en) | 2002-09-16 | 2004-07-01 | Siemens Aktiengesellschaft | System for detection and indication of a secure status of appliances |
US20040059920A1 (en) * | 2002-09-19 | 2004-03-25 | International Business Machines Corporation | Security health checking tool |
US20040075590A1 (en) | 2002-09-25 | 2004-04-22 | Pearson Esther Mae | E-learning biometric identification information system |
US20040107345A1 (en) | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US20040139353A1 (en) | 2002-11-19 | 2004-07-15 | Forcade Jonathan Brett | Methodology and system for real time information system application intrusion detection |
US20040260954A1 (en) | 2003-06-19 | 2004-12-23 | Schneider Automation Inc. | Biometrics PLC access and control system and method |
US20050021839A1 (en) | 2003-06-23 | 2005-01-27 | Russell Thomas C. | Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites |
US20050091492A1 (en) | 2003-10-27 | 2005-04-28 | Benson Glenn S. | Portable security transaction protocol |
US7761460B1 (en) | 2004-02-04 | 2010-07-20 | Rockwell Automation Technologies, Inc. | Systems and methods that utilize a standard database interface to access data within an industrial device |
US20050228998A1 (en) | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US7950044B2 (en) | 2004-09-28 | 2011-05-24 | Rockwell Automation Technologies, Inc. | Centrally managed proxy-based security for legacy automation systems |
US7716489B1 (en) | 2004-09-29 | 2010-05-11 | Rockwell Automation Technologies, Inc. | Access control method for disconnected automation systems |
US8429393B1 (en) | 2004-09-30 | 2013-04-23 | Rockwell Automation Technologies, Inc. | Method for obscuring a control device's network presence by dynamically changing the device's network addresses using a cryptography-based pattern |
US20060095771A1 (en) | 2004-11-02 | 2006-05-04 | Guido Appenzeller | Security device for cryptographic communications |
US7990967B2 (en) | 2005-01-06 | 2011-08-02 | Rockwell Automation Technologies, Inc. | Firewall method and apparatus for industrial systems |
US8774186B2 (en) | 2005-01-06 | 2014-07-08 | Rockwell Automation Technologies, Inc. | Firewall method and apparatus for industrial systems |
US20060206932A1 (en) | 2005-03-14 | 2006-09-14 | Microsoft Corporation | Trusted third party authentication for web services |
US8732658B2 (en) | 2006-09-29 | 2014-05-20 | Rockwell Automation Technologies, Inc. | Layered interface in an industrial environment |
US8776092B2 (en) | 2006-09-29 | 2014-07-08 | Rockwell Automation Technologies, Inc. | Multiple interface support |
Non-Patent Citations (44)
Title |
---|
A.C. Weaver. Institute of Electrical and Electronics Engineers: "Factory Monitoring and Control Using the Internet". Proceedings of the 27th Annual Conference of the IEEE Industrial Electronics Society. Denver, CO, Nov. 29-Dec. 2, 2001, Annual Conference of the IEEE Industrial Electronics Society, New York, NY: IEEE, US, vol. 1 of 3 Conf. Nov. 27 and 29, 2001 pp. 1639-1645. 32 pages. |
Berrendonner, et al. "MAKE: Mutual Authentication with Key Exchange" Oct. 31, 2001 Internet Engineering Task Force, pp. 6-7. |
Bridges, S., Vaughn, R. and Siraj, A. "Al Techniques Applied to High Performance Computing Intrusion Detection" Proceeding of the Tenth International Conference on Telecommunication Systems, Modeling and Analysis, Monterey CA, vol. 2, pp. 100-114, Oct. 3-6, 2002. |
D. Harrold; Control Engineering; Online, Mar. 1, 2003; http://www.manufacturing.net/ctl.article/CA283196. |
D. Spinellis, S. Kokolakis and S. Gritzalis; Security Requirements, risks and recommendations for small enterprise and home-office environments; Information Management & Computer Security; Online, vol. 7, No. 3, Dec. 31, 1999; http://www.dmst.aueb.gr/dds/pubs/jml/1999-1MCS-Soft-Risk/html/soho.pdf. |
Dichtl, et al., "A High Quality Physical Random No. Generator", Proc. Sophia Forums Microelectronics (SAME 2000), pp. 48-53, 2000. Last accessed Jul. 21, 2011, 9 pages. |
EP OA dated Sep. 11, 2008 for EP Application No. 07117185.4-2413, 6 pages. |
EPB OA dated Jul. 4, 2007 for European Patent Application No. 03 023 911.5, 7 pages. |
EPB OA Dated Jul. 8, 2008 for European Patent Application No. 03 023 911.5, 7 pages. |
EPC OA dated Jul. 4, 2007 for European Patent Application No. 03 023 916.4, 5 pages. |
EPC OA dated Jun. 30, 2008 for European Patent Application No. 03 023 916.4, 6 pages. |
European Search Report dated Dec. 5, 2007, mailed Jan. 4, 2008 for Application EP07117185, 6 pages. |
European Search Report dated Oct. 31, 2005 mailed Nov. 15, 2005 for European Patent Application Serial No. 03023911.4-2413, 3 Pages. |
European Search Report dated Oct. 7, 2005 mailed Nov. 3, 2005 for European Patent Application Serial No. 03023916.4-2413 PCT, 3 pages. |
F. Olaechea. Partial European Search Report. Feb. 18, 2005. 5 pages. The Hague. |
F. Olaechea; Partial European Search Report; EP 03 02 3916; The Hague, Nov. 16, 2004. |
Final OA mailed Oct. 1, 2008 for U.S. Appl. No. 10/661,690, 31 pages. |
Gervais, A., 'Security Analysis of Industrial Control Systems', Aalto University-KTH Stockholm, Jun. 29, 2012, entire document, http://nordsecmob.aalto.fi/en/publications/theses-2012/gervais-arthu r-thesis.pdf. * |
H. Debar et al., A Neural Network Component for an Intrusion Detection System, Proceedings of the Computer Society on Research in Security and Privacy, Oakland, May 4-6, 1992, pp. 240-250, 1992, Los Alamitos, IEEE Comp. Soc. Press, US. |
H.S. Teng et al., Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns, Proceedings of Symposium on Research in Security and Privacy, Oakland, May 7-9, 1990, pp. 278-284, Los Alamitos, IEEE Comp. Soc. Press, US. |
Huang, et al. Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. In Proceedinds of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA'03), NY, USA, pp. 141-150. |
Insight Consulting; Insight on CRAMM IV; Insight Consulting Online; Nov. 30, 2001; http://www.infosec-associates.com/framework/downloads/insight-cramm.pdf. |
Interkama; DuPont Shares Network Security Methodology; Interkama Online, Mar. 15, 2002; http://www3.interkama.com/cipp/interkama/custom/pub/content,lang,2/ticket,g-u-e-s-t/oid,3781. |
J. Rinaldi. "Introduction to Ethernet/IP". The Online Industrial Ethernet Book. Sep. 30, 2002. Retrieved from the internet: URL: http://ethernet.industrial-networking.com/articles/illethernet.asp retrieved on Nov. 18, 2004. 2 pages. |
L. Falkenau; Site networking and beyond; ISA, Online, Jul. 1, 2003; http://www.isa.org/InTechTemplate.cfm?Section=Departments4&template=/ContentManagement/ContentDisplay.cfm&ContentID=28025. |
Lai, et al. "Scalable Session Key Construction Protocol for Wireless Sensor Networks" 2002, IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), 6 pages. |
N. Jones, et al. "Introducing EtherNET/IP". 6th ODVA annual meeting Mar. 8, 2000. Retrieved from the Internet: URL: http://www.odva.org/10-2/03-events /NewEtherNet/EtherNet-IPOverview.ppt retrieved on Nov. 11, 2004. 25 pages. |
Ng, et al. "Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications" Apr. 2004 IEEE Communication Letters vol. 8 No. 4 pp. 262-263. |
OA dated Apr. 27, 2009 for U.S. Appl. No. 10/661,239, 25 pages. |
OA dated Dec. 16, 2009 for U.S. Appl. No. 11/535,773, 38 pages. |
OA dated Jan. 21, 2011 for U.S. Appl. No. 11/535,773,55 pages. |
OA dated Jul. 21, 2011 for U.S. Appl. No. 11/535,773, 42 pages. |
OA dated Jun. 10, 2009 for U.S. Appl. No. 10/661,690, 24 pages. |
OA dated May 11, 2010 for U.S. Appl. No. 11535773, 45 pages. |
OA Dated Oct. 22, 2008 for U.S. Appl. No. 10661239, 19 pages. |
Office Action for U.S. Appl. No. 13/593,037, dated Jul. 16, 2014, 39 pages. |
P. Oman et al., Concerns About Intrusions Into Remotely Accessible Substation Controllers and Scada Systems, 2000, 16 pages, retrived from the Internet: URL: http://citeseer.ist.psu.edu/cache/papers/cs/26811/http:zSzzSzwww.csds.uidaho.eduzSzdirectorzSzSC ADA.pdf/oman00concerns.pdf. |
Rockwell Automation: "Plant Floor Security. Proposed Agenda for Sector Workshop" , May 6, 2002. Retrieved from the internet on Jun. 17, 2007. http://www.isd.mel.nist.gov/projects/processcontrol/members/documents/RA-Workshop-Agenda.pdf, 52 pages. |
Rockwell Automation; Rockwell Automation and DuPont Engineering sign worldwide licensing agreement to standardize and improve industrial computer networking security; Online, Mar. 7, 2002; http://domino.automation.rockwell.com/applications/gs/region/gtwwebst.nsf/pages/Rockwell-Automation-and-DuPont-Engineering-Sign- . . . . |
Sang-Ho Lee, Suk Lee, Joon-Woo Son, Man Hyung Lee, Janmyung Lee, Jong Il Bae, Jong-Nyun Lee, "Neuro-Fuzzy Performan Management of Factory Automation Networks", 1997, 5 pages. |
T. Cutler. "Wireless Ethernet and How to Use It". The Online Industrial Ethernet Book. Oct. 10, 2002. Retrieved from the internet: URL: http//web.archive.org/web/20021020173452/http://ethernet.industrial-networking.com/articles/i05wirelessethernet.asp retrieved on Nov. 18, 2004. 3 pages. |
Verano, Defender Watches Over Industrial Control Networks, Aug. 10, 2003, 2 pages, retrived from the Internet: URL: http://web.archive.org/web/20030810201511/http://www.engineeringtalk.com/news/vra/vra102.html. |
Wilmington Section ISA; Wilmington ISA Section Plant Tour of Astropower; ISA Online, Mar. 21, 2001; http://www.isa.org/{wilmdel/Sensor/Mar01.pdf. |
Wong, et al. "Mutual Authentication and Key Exchange for Low Power Wireless Communications" Proceedings of MILCOM 2001, IEEE, pp. 39-43. |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10862902B2 (en) | 2002-10-21 | 2020-12-08 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US9412073B2 (en) * | 2002-10-21 | 2016-08-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US20150213369A1 (en) * | 2002-10-21 | 2015-07-30 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US20140343732A1 (en) * | 2012-02-01 | 2014-11-20 | Abb Research Ltd. | Dynamic configuration of an industrial control system |
US9678492B2 (en) * | 2012-02-01 | 2017-06-13 | Abb Research Ltd. | Dynamic configuration of an industrial control system |
US20170061514A1 (en) * | 2012-10-17 | 2017-03-02 | Wal-Mart Stores, Inc. | Http parallel processing router |
US9824386B2 (en) * | 2012-10-17 | 2017-11-21 | Wal-Mart Stores, Inc. | HTTP parallel processing router |
US20140277612A1 (en) * | 2013-03-14 | 2014-09-18 | General Electric Company | Automatic generation of a dynamic pre-start checklist |
US20150370235A1 (en) * | 2013-03-31 | 2015-12-24 | Schneider Electric USA, Inc. | Analyzing scada systems |
US11102091B2 (en) | 2013-03-31 | 2021-08-24 | Schneider Electric USA, Inc. | Analyzing SCADA systems |
US9933772B2 (en) * | 2013-03-31 | 2018-04-03 | Schneider Electric USA, Inc. | Analyzing SCADA systems |
US9998282B2 (en) | 2013-10-30 | 2018-06-12 | Duo Security, Inc. | System and methods for opportunistic cryptographic key management on an electronic device |
US10237062B2 (en) | 2013-10-30 | 2019-03-19 | Duo Security, Inc. | System and methods for opportunistic cryptographic key management on an electronic device |
US10901521B2 (en) | 2014-01-31 | 2021-01-26 | Nanotronics Imaging, Inc. | Apparatus and method for manipulating objects with gesture controls |
US11747911B2 (en) | 2014-01-31 | 2023-09-05 | Nanotronics Imaging, Inc. | Apparatus and method for manipulating objects with gesture controls |
US11409367B2 (en) | 2014-01-31 | 2022-08-09 | Nanotronics Imaging, Inc. | Apparatus and method for manipulating objects with gesture controls |
US9369478B2 (en) * | 2014-02-06 | 2016-06-14 | Nicira, Inc. | OWL-based intelligent security audit |
US20150222666A1 (en) * | 2014-02-06 | 2015-08-06 | Vmware, Inc. | OWL-Based Intelligent Security Audit |
US9825765B2 (en) | 2015-03-31 | 2017-11-21 | Duo Security, Inc. | Method for distributed trust authentication |
US10116453B2 (en) | 2015-03-31 | 2018-10-30 | Duo Security, Inc. | Method for distributed trust authentication |
US9942048B2 (en) | 2015-03-31 | 2018-04-10 | Duo Security, Inc. | Method for distributed trust authentication |
US10318903B2 (en) | 2016-05-06 | 2019-06-11 | General Electric Company | Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control |
US10318904B2 (en) | 2016-05-06 | 2019-06-11 | General Electric Company | Computing system to control the use of physical state attainment of assets to meet temporal performance criteria |
US11251970B2 (en) * | 2016-10-18 | 2022-02-15 | Cybernetica As | Composite digital signatures |
US11731368B2 (en) | 2018-04-02 | 2023-08-22 | Nanotronics Imaging, Inc. | Systems, methods, and media for artificial intelligence process control in additive manufacturing |
US11588838B2 (en) | 2018-06-06 | 2023-02-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11528287B2 (en) | 2018-06-06 | 2022-12-13 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11611577B2 (en) | 2018-06-06 | 2023-03-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11921864B2 (en) | 2018-06-06 | 2024-03-05 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11687659B2 (en) | 2018-06-06 | 2023-06-27 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11637847B2 (en) * | 2018-06-06 | 2023-04-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11265338B2 (en) | 2018-06-06 | 2022-03-01 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11297080B2 (en) | 2018-06-06 | 2022-04-05 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11323462B2 (en) | 2018-06-06 | 2022-05-03 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11363043B2 (en) | 2018-06-06 | 2022-06-14 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11374951B2 (en) | 2018-06-06 | 2022-06-28 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11831491B2 (en) | 2018-11-21 | 2023-11-28 | Cisco Technology, Inc. | System and methods to validate issue detection and classification in a network assurance system |
US11153152B2 (en) | 2018-11-21 | 2021-10-19 | Cisco Technology, Inc. | System and methods to validate issue detection and classification in a network assurance system |
US11252046B2 (en) * | 2018-12-14 | 2022-02-15 | Juniper Networks, Inc. | System for identifying and assisting in the creation and implementation of a network service configuration using Hidden Markov Models (HMMs) |
US11968240B2 (en) * | 2019-03-04 | 2024-04-23 | Cisco Technology, Inc. | Network posture based suggestion of applications and services |
US11138869B2 (en) | 2019-04-24 | 2021-10-05 | Carrier Corporation | Alarm system |
US11596823B2 (en) | 2019-05-29 | 2023-03-07 | Honeywell International Inc. | Operating a fire control system |
US11083919B2 (en) | 2019-05-29 | 2021-08-10 | Honeywell International Inc. | Operating a fire control system |
US11669078B2 (en) | 2019-06-24 | 2023-06-06 | Nanotronics Imaging, Inc. | Predictive process control for a manufacturing process |
US11709483B2 (en) | 2019-06-24 | 2023-07-25 | Nanotronics Imaging, Inc. | Predictive process control for a manufacturing process |
US11156992B2 (en) | 2019-06-24 | 2021-10-26 | Nanotronics Imaging, Inc. | Predictive process control for a manufacturing process |
US11156991B2 (en) | 2019-06-24 | 2021-10-26 | Nanotronics Imaging, Inc. | Predictive process control for a manufacturing process |
US11117328B2 (en) | 2019-09-10 | 2021-09-14 | Nanotronics Imaging, Inc. | Systems, methods, and media for manufacturing processes |
US11100221B2 (en) | 2019-10-08 | 2021-08-24 | Nanotronics Imaging, Inc. | Dynamic monitoring and securing of factory processes, equipment and automated systems |
US11693956B2 (en) | 2019-10-08 | 2023-07-04 | Nanotronics Imaging, Inc. | Dynamic monitoring and securing of factory processes, equipment and automated systems |
US11163890B2 (en) | 2019-10-09 | 2021-11-02 | United States Of America As Represented By The Secretary Of The Navy | Self-targeting method of automated cybersecurity analysis on an operating system |
US11663327B2 (en) | 2020-02-28 | 2023-05-30 | Nanotronics Imaging, Inc. | Method, systems and apparatus for intelligently emulating factory control systems and simulating response data |
US11086988B1 (en) | 2020-02-28 | 2021-08-10 | Nanotronics Imaging, Inc. | Method, systems and apparatus for intelligently emulating factory control systems and simulating response data |
Also Published As
Publication number | Publication date |
---|---|
EP1420317A3 (fr) | 2005-12-21 |
EP1420317B1 (fr) | 2016-12-14 |
EP1420317A2 (fr) | 2004-05-19 |
US20150067844A1 (en) | 2015-03-05 |
US20040117624A1 (en) | 2004-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8909926B2 (en) | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment | |
US10862902B2 (en) | System and methodology providing automation security analysis and network intrusion protection in an industrial environment | |
US20240073242A1 (en) | Cyber security appliance for an operational technology network | |
US11818098B2 (en) | Security system, device, and method for protecting control systems | |
US9961099B2 (en) | Systems and methods for detecting and tracking adversary trajectory | |
US9853999B2 (en) | Context-aware knowledge system and methods for deploying deception mechanisms | |
US11595396B2 (en) | Enhanced smart process control switch port lockdown | |
US10530749B1 (en) | Security system, device, and method for operational technology networks | |
US20170214708A1 (en) | Detecting security threats by combining deception mechanisms and data science | |
EP1640836B1 (fr) | Sécurité proxy gérée centralement pour les systèmes d'automatisation hérités | |
US20170093910A1 (en) | Dynamic security mechanisms | |
Flaus | Cybersecurity of industrial systems | |
EP2866407A1 (fr) | Protection de systèmes de commande automatisés | |
Ulltveit-Moe et al. | Secure information sharing in an industrial Internet of Things | |
US20210092097A1 (en) | Whitelisting for HART Communications in a Process Control System | |
US20180309724A1 (en) | Control plane network security | |
Wei et al. | On protecting industrial automation and control systems against electronic attacks | |
Rehan | Cybersecurity with AWS IoT | |
NL2020552B1 (en) | Attribute-based policies for integrity monitoring and network intrusion detection | |
Shikhaliyev | Cybersecurity analysis of industrial control systems | |
CN115826508A (zh) | 机箱上背板入侵检测系统和连续威胁检测启用平台 | |
Araghi et al. | Improving security in SCADA systems | |
Karthika et al. | Safeguarding Scada Network by Captious State Based Filter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANDT, DAVID D.;HALL, KENWOOD;ANDERSON, MARK BURTON;AND OTHERS;REEL/FRAME:014869/0185;SIGNING DATES FROM 20030904 TO 20031217 Owner name: ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANDT, DAVID D.;HALL, KENWOOD;ANDERSON, MARK BURTON;AND OTHERS;SIGNING DATES FROM 20030904 TO 20031217;REEL/FRAME:014869/0185 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |